Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-6816
Vulnerability from cvelistv5
Published
2024-01-18 04:31
Modified
2024-11-23 02:52
Severity ?
EPSS score ?
Summary
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Red Hat | Red Hat Enterprise Linux 7 |
Unaffected: 0:1.20.4-27.el7_9 < * cpe:/o:redhat:enterprise_linux:7::client cpe:/o:redhat:enterprise_linux:7::server cpe:/o:redhat:enterprise_linux:7::computenode cpe:/o:redhat:enterprise_linux:7::workstation |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:42:07.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "name": "RHSA-2024:0320", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "RHSA-2024:0557", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "RHSA-2024:0558", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "RHSA-2024:0597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "RHSA-2024:0607", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "RHSA-2024:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "RHSA-2024:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "RHSA-2024:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "RHSA-2024:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "RHSA-2024:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "RHSA-2024:2169", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "name": "RHSA-2024:2170", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "name": "RHSA-2024:2996", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "RHBZ#2257691", "tags": [ "issue-tracking", "x_refsource_REDHAT", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-30" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.4-27.el7_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::workstation" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 7", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.8.0-31.el7_9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-2.el8_9.7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:8::appstream" ], "defaultStatus": "affected", "packageName": "xorg-x11-server-Xwayland", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:21.1.3-15.el8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_tus:8.2::appstream", "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_aus:8.4::appstream", "cpe:/a:redhat:rhel_e4s:8.4::appstream", "cpe:/a:redhat:rhel_tus:8.4::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.6::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.6 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-6.el8_6.9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:8.8::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 8.8 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-15.el8_8.7", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-3.el9_3.6", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.11-24.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:enterprise_linux:9::appstream" ], "defaultStatus": "affected", "packageName": "xorg-x11-server-Xwayland", "product": "Red Hat Enterprise Linux 9", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:22.1.9-5.el9", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.0::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9.0 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-22.el9_0.8", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/a:redhat:rhel_eus:9.2::appstream" ], "defaultStatus": "affected", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 9.2 Extended Update Support", "vendor": "Red Hat", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-14.el9_2.5", "versionType": "rpm" } ] }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "tigervnc", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:6" ], "defaultStatus": "unknown", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 6", "vendor": "Red Hat" }, { "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", "cpes": [ "cpe:/o:redhat:enterprise_linux:8" ], "defaultStatus": "affected", "packageName": "xorg-x11-server", "product": "Red Hat Enterprise Linux 8", "vendor": "Red Hat" } ], "credits": [ { "lang": "en", "value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue." } ], "datePublic": "2024-01-16T00:00:00+00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." } ], "metrics": [ { "other": { "content": { "namespace": "https://access.redhat.com/security/updates/classification/", "value": "Important" }, "type": "Red Hat severity rating" } }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-23T02:52:08.911Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2024:0320", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "RHSA-2024:0557", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "RHSA-2024:0558", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "RHSA-2024:0597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "RHSA-2024:0607", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "RHSA-2024:0614", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "RHSA-2024:0617", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "RHSA-2024:0621", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "RHSA-2024:0626", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "RHSA-2024:0629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "RHSA-2024:2169", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "name": "RHSA-2024:2170", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "name": "RHSA-2024:2996", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "tags": [ "vdb-entry", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "RHBZ#2257691", "tags": [ "issue-tracking", "x_refsource_REDHAT" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" } ], "timeline": [ { "lang": "en", "time": "2024-01-10T00:00:00+00:00", "value": "Reported to Red Hat." }, { "lang": "en", "time": "2024-01-16T00:00:00+00:00", "value": "Made public." } ], "title": "Xorg-x11-server: heap buffer overflow in devicefocusevent and procxiquerypointer", "workarounds": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ], "x_redhatCweChain": "CWE-787: Out-of-bounds Write" } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2023-6816", "datePublished": "2024-01-18T04:31:07.908Z", "dateReserved": "2023-12-14T04:34:38.017Z", "dateUpdated": "2024-11-23T02:52:08.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-6816\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-01-18T05:15:08.607\",\"lastModified\":\"2024-11-21T08:44:37.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.1.11\",\"matchCriteriaId\":\"565381E7-E0BD-408F-B970-34E9724B1B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"23.2.4\",\"matchCriteriaId\":\"1FE48099-1D7F-444E-8F0C-FAB71F25AD71\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/01/18/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0320\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0617\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0626\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:0629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2169\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2170\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2996\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-6816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2257691\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202401-30\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240307-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2024_2169
Vulnerability from csaf_redhat
Published
2024-04-30 10:11
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\n* xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2169", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2244736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2169.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server security update", "tracking": { "current_release_date": "2024-11-25T09:49:10+00:00", "generator": { "date": "2024-11-25T09:49:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2169", "initial_release_date": "2024-04-30T10:11:05+00:00", "revision_history": [ { "date": "2024-04-30T10:11:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T10:11:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:49:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 9)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-24.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product_id": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-24.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product_id": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-24.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-0:1.20.11-24.el9.src", "product": { "name": "xorg-x11-server-0:1.20.11-24.el9.src", "product_id": "xorg-x11-server-0:1.20.11-24.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-24.el9?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src" }, "product_reference": "xorg-x11-server-0:1.20.11-24.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.11-24.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src" }, "product_reference": "xorg-x11-server-0:1.20.11-24.el9.src", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.i686", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "relates_to_product_reference": "CRB-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.11-24.el9.noarch as a component of Red Hat Enterprise Linux CRB (v. 9)", "product_id": "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.11-24.el9.noarch", "relates_to_product_reference": "CRB-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "cve": "CVE-2023-5380", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2244736" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Use-after-free bug in DestroyWindow", "title": "Vulnerability summary" }, { "category": "other", "text": "The xorg-x11-server-Xwayland package as shipped by Red Hat Enterprise Linux 8 and 9 is not affected by this issue as Xwayland does not support multiple protocol screens and is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5380" }, { "category": "external", "summary": "RHBZ#2244736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5380", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5380" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Use-after-free bug in DestroyWindow" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T10:11:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch", "CRB-9.4.0.GA:xorg-x11-server-0:1.20.11-24.el9.src", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-common-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debuginfo-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-debugsource-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.aarch64", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.i686", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.ppc64le", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.s390x", "CRB-9.4.0.GA:xorg-x11-server-devel-0:1.20.11-24.el9.x86_64", "CRB-9.4.0.GA:xorg-x11-server-source-0:1.20.11-24.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0617
Vulnerability from csaf_redhat
Published
2024-01-31 07:10
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0617", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0617.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:45:45+00:00", "generator": { "date": "2024-11-25T09:45:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0617", "initial_release_date": "2024-01-31T07:10:52+00:00", "revision_history": [ { "date": "2024-01-31T07:10:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T07:10:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:45:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.src", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.src", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T07:10:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.ppc64le", "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.src", "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.9.noarch", "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.9.x86_64", "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0557
Vulnerability from csaf_redhat
Published
2024-01-30 11:00
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0557", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0557.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:44:55+00:00", "generator": { "date": "2024-11-25T09:44:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0557", "initial_release_date": "2024-01-30T11:00:18+00:00", "revision_history": [ { "date": "2024-01-30T11:00:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T11:00:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:44:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.src", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.src", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-3.el9_3.6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-3.el9_3.6?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-3.el9_3.6?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product": { "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product_id": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-3.el9_3.6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.src", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch" }, "product_reference": "tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:00:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.src", "AppStream-9.3.0.Z.MAIN:tigervnc-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-icons-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-license-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-selinux-0:1.13.1-3.el9_3.6.noarch", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-0:1.13.1-3.el9_3.6.x86_64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.aarch64", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.ppc64le", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.s390x", "AppStream-9.3.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-3.el9_3.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0320
Vulnerability from csaf_redhat
Published
2024-01-22 13:53
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: xorg-x11-server security update
Notes
Topic
An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0320", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0320.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server security update", "tracking": { "current_release_date": "2024-11-25T09:44:04+00:00", "generator": { "date": "2024-11-25T09:44:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0320", "initial_release_date": "2024-01-22T13:53:02+00:00", "revision_history": [ { "date": "2024-01-22T13:53:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-22T13:53:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:44:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product_id": "xorg-x11-server-0:1.20.4-27.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-27.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=i686" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product_id": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-27.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-27.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product_id": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-27.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product_id": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-27.el7_9?arch=ppc" } } }, { "category": "product_version", "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product_id": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-27.el7_9?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-0:1.20.4-27.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src" }, "product_reference": "xorg-x11-server-0:1.20.4-27.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64" }, "product_reference": "xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" }, "product_reference": "xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-22T13:53:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch", "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-27.el7_9.src", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.s390x", "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.i686", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.ppc64le", "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-27.el7_9.x86_64", "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-27.el7_9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_2170
Vulnerability from csaf_redhat
Published
2024-04-30 09:50
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2170", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2170.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update", "tracking": { "current_release_date": "2024-11-25T09:49:22+00:00", "generator": { "date": "2024-11-25T09:49:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2170", "initial_release_date": "2024-04-30T09:50:06+00:00", "revision_history": [ { "date": "2024-04-30T09:50:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-30T09:50:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:49:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@22.1.9-5.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@22.1.9-5.el9?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@22.1.9-5.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "relates_to_product_reference": "AppStream-9.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64", "relates_to_product_reference": "AppStream-9.4.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-30T09:50:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.src", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debuginfo-0:22.1.9-5.el9.x86_64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.aarch64", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.ppc64le", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.s390x", "AppStream-9.4.0.GA:xorg-x11-server-Xwayland-debugsource-0:22.1.9-5.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_2996
Vulnerability from csaf_redhat
Published
2024-05-22 10:12
Modified
2024-11-25 09:49
Summary
Red Hat Security Advisory: xorg-x11-server-Xwayland security update
Notes
Topic
An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)
* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)
* xorg-x11-server: SELinux context corruption (CVE-2024-0409)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408)\n\n* xorg-x11-server: SELinux context corruption (CVE-2024-0409)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2996", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index" }, { "category": "external", "summary": "2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2996.json" } ], "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update", "tracking": { "current_release_date": "2024-11-25T09:49:58+00:00", "generator": { "date": "2024-11-25T09:49:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:2996", "initial_release_date": "2024-05-22T10:12:23+00:00", "revision_history": [ { "date": "2024-05-22T10:12:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-05-22T10:12:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:49:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=aarch64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=x86_64" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-15.el8?arch=s390x" } } }, { "category": "product_version", "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-15.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "relates_to_product_reference": "AppStream-8.10.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" }, "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64", "relates_to_product_reference": "AppStream-8.10.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5367", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2243091" } ], "notes": [ { "category": "description", "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5367" }, { "category": "external", "summary": "RHBZ#2243091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html", "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html" } ], "release_date": "2023-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6377", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253291" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6377" }, { "category": "external", "summary": "RHBZ#2253291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6377", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6377" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions" }, { "acknowledgments": [ { "names": [ "Peter Hutterer" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-6478", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2023-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253298" } ], "notes": [ { "category": "description", "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6478" }, { "category": "external", "summary": "RHBZ#2253298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478" }, { "category": "external", "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632", "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632" }, { "category": "external", "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html", "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html" } ], "release_date": "2023-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan", "Donn Seeley" ] } ], "cve": "CVE-2024-0408", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257689" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux unlabeled GLX PBuffer", "title": "Vulnerability summary" }, { "category": "other", "text": "X.org server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0408" }, { "category": "external", "summary": "RHBZ#2257689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0408" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux unlabeled GLX PBuffer" }, { "acknowledgments": [ { "names": [ "Olivier Fourdan" ] } ], "cve": "CVE-2024-0409", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: SELinux context corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9; therefore, Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0409" }, { "category": "external", "summary": "RHBZ#2257690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0409" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: SELinux context corruption" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-05-22T10:12:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.src", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-15.el8.x86_64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.aarch64", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.ppc64le", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.s390x", "AppStream-8.10.0.GA:xorg-x11-server-Xwayland-debugsource-0:21.1.3-15.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0558
Vulnerability from csaf_redhat
Published
2024-01-30 11:03
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0558", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0558.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:45:08+00:00", "generator": { "date": "2024-11-25T09:45:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0558", "initial_release_date": "2024-01-30T11:03:52+00:00", "revision_history": [ { "date": "2024-01-30T11:03:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T11:03:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:45:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.src", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T11:03:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.ppc64le", "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.src", "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.8.noarch", "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.8.x86_64", "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0614
Vulnerability from csaf_redhat
Published
2024-01-30 15:25
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0614", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0614.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:44:42+00:00", "generator": { "date": "2024-11-25T09:44:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0614", "initial_release_date": "2024-01-30T15:25:28+00:00", "revision_history": [ { "date": "2024-01-30T15:25:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T15:25:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:44:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.src", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.src", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.8?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product": { "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.src", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch" }, "product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T15:25:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.src", "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.8.noarch", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.8.x86_64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.aarch64", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.ppc64le", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.s390x", "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0597
Vulnerability from csaf_redhat
Published
2024-01-30 14:14
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0597", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0597.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:44:30+00:00", "generator": { "date": "2024-11-25T09:44:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0597", "initial_release_date": "2024-01-30T14:14:03+00:00", "revision_history": [ { "date": "2024-01-30T14:14:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T14:14:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:44:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.src", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.src", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:14:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.src", "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.7.noarch", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.7.x86_64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.aarch64", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.ppc64le", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.s390x", "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0629
Vulnerability from csaf_redhat
Published
2024-01-31 08:52
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0629", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0629.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:45:33+00:00", "generator": { "date": "2024-11-25T09:45:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0629", "initial_release_date": "2024-01-31T08:52:59+00:00", "revision_history": [ { "date": "2024-01-31T08:52:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T08:52:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:45:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.src", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.src", "product_id": "tigervnc-0:1.8.0-31.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-31.el7_9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-31.el7_9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product_id": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-31.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=ppc64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product_id": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-31.el7_9?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-31.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product_id": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-31.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-icons-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-license-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch" }, "product_reference": "tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Client-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Server-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.src", "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-31.el7_9.noarch", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.s390x", "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-31.el7_9.x86_64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.ppc64le", "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-31.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0621
Vulnerability from csaf_redhat
Published
2024-01-30 16:13
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0621", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0621.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:45:20+00:00", "generator": { "date": "2024-11-25T09:45:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0621", "initial_release_date": "2024-01-30T16:13:28+00:00", "revision_history": [ { "date": "2024-01-30T16:13:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T16:13:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:45:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.src", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.src", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.9?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T16:13:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.src", "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.9.noarch", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.9.x86_64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.aarch64", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.ppc64le", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.s390x", "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0626
Vulnerability from csaf_redhat
Published
2024-01-31 08:35
Modified
2024-11-25 09:45
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0626", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0626.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:45:57+00:00", "generator": { "date": "2024-11-25T09:45:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0626", "initial_release_date": "2024-01-31T08:35:55+00:00", "revision_history": [ { "date": "2024-01-31T08:35:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-31T08:35:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:45:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.src", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.src", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.5?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.5?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product": { "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch" }, "product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-31T08:35:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.src", "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.5.noarch", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.5.x86_64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.aarch64", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.ppc64le", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.s390x", "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
rhsa-2024_0607
Vulnerability from csaf_redhat
Published
2024-01-30 14:56
Modified
2024-11-25 09:44
Summary
Red Hat Security Advisory: tigervnc security update
Notes
Topic
An update for tigervnc is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)
* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)
* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)
* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0607", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0607.json" } ], "title": "Red Hat Security Advisory: tigervnc security update", "tracking": { "current_release_date": "2024-11-25T09:44:18+00:00", "generator": { "date": "2024-11-25T09:44:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2024:0607", "initial_release_date": "2024-01-30T14:56:13+00:00", "revision_history": [ { "date": "2024-01-30T14:56:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-30T14:56:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T09:44:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.src", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.src", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } }, { "category": "product_version", "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.7?arch=noarch" } } }, { "category": "product_version", "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product": { "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.src", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch" }, "product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" }, "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2023-6816", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2257691" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer", "title": "Vulnerability summary" }, { "category": "other", "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "category": "external", "summary": "RHBZ#2257691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2024-0229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256690" } ], "notes": [ { "category": "description", "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-0229" }, { "category": "external", "summary": "RHBZ#2256690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21885", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256540" } ], "notes": [ { "category": "description", "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21885" }, { "category": "external", "summary": "RHBZ#2256540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent" }, { "acknowledgments": [ { "names": [ "Jan-Niklas Sohn" ], "organization": "Trend Micro Zero Day Initiative" } ], "cve": "CVE-2024-21886", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2024-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2256542" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "xorg-x11-server: heap buffer overflow in DisableDevice", "title": "Vulnerability summary" }, { "category": "other", "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-21886" }, { "category": "external", "summary": "RHBZ#2256542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886" } ], "release_date": "2024-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-30T14:56:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.src", "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.7.noarch", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.7.x86_64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.aarch64", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.ppc64le", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.s390x", "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xorg-x11-server: heap buffer overflow in DisableDevice" } ] }
gsd-2023-6816
Vulnerability from gsd
Modified
2023-12-14 06:01
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-6816" ], "details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "id": "GSD-2023-6816", "modified": "2023-12-14T06:01:34.603483Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2023-6816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Red Hat Enterprise Linux 7", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.20.4-27.el7_9", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.8.0-31.el7_9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-2.el8_9.7", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.9.0-15.el8_2.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-8.el8_4.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-6.el8_6.9", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-15.el8_8.7", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.13.1-3.el9_3.6", "versionType": "rpm" } ] } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected" } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.11.0-22.el9_0.8", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "affected", "versions": [ { "lessThan": "*", "status": "unaffected", "version": "0:1.12.0-14.el9_2.5", "versionType": "rpm" } ] } } ] } }, { "product_name": "Red Hat Enterprise Linux 6", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "defaultStatus": "unknown" } } ] } } ] }, "vendor_name": "Red Hat" } ] } }, "credits": [ { "lang": "en", "value": "Red Hat would like to thank Jan-Niklas Sohn (Trend Micro Zero Day Initiative) for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-787", "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2024/01/18/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0320", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0557", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0558", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0597", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0607", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0614", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0617", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0621", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0626", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "name": "https://access.redhat.com/errata/RHSA-2024:0629", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "name": "https://access.redhat.com/security/cve/CVE-2023-6816", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "name": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "name": "https://security.gentoo.org/glsa/202401-30", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202401-30" }, { "name": "https://security.netapp.com/advisory/ntap-20240307-0006/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ] }, "work_around": [ { "lang": "en", "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability." } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "565381E7-E0BD-408F-B970-34E9724B1B08", "versionEndExcluding": "21.1.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FE48099-1D7F-444E-8F0C-FAB71F25AD71", "versionEndExcluding": "23.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en el servidor X.Org. Tanto DeviceFocusEvent como la respuesta de XIQueryPointer contienen un bit para cada bot\u00f3n l\u00f3gico actualmente presionado. Los botones se pueden asignar arbitrariamente a cualquier valor hasta 255, pero el servidor X.Org solo asignaba espacio para la cantidad particular de botones del dispositivo, lo que provocaba un desbordamiento de b\u00fafer en la regi\u00f3n Heap de la memoria si se usaba un valor mayor." } ], "id": "CVE-2023-6816", "lastModified": "2024-03-07T17:15:12.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" } ] }, "published": "2024-01-18T05:15:08.607", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "source": "secalert@redhat.com", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/" }, { "source": "secalert@redhat.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/202401-30" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20240307-0006/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "secalert@redhat.com", "type": "Secondary" } ] } } } }
NCSC-2024-0414
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:17
Modified
2024-10-17 13:17
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van gegevens
- Uitvoer van willekeurige code (Gebruikersrechten)
- Uitvoer van willekeurige code (Administratorrechten)
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-606
Unchecked Input for Loop Condition
CWE-390
Detection of Error Condition Without Action
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-222
Truncation of Security-relevant Information
CWE-364
Signal Handler Race Condition
CWE-450
Multiple Interpretations of UI Input
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-195
Signed to Unsigned Conversion Error
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-459
Incomplete Cleanup
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-918
Server-Side Request Forgery (SSRF)
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Signal Handler Race Condition", "title": "CWE-364" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncaught Exception", "title": "CWE-248" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-10-17T13:17:52.103171Z", "id": "NCSC-2024-0414", "initial_release_date": "2024-10-17T13:17:52.103171Z", "revision_history": [ { "date": "2024-10-17T13:17:52.103171Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670439", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670429", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670435", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670431", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670436", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670432", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670434", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670438", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635315", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674641", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670437", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications__10.4.0.4", "product": { "name": "communications__10.4.0.4", "product_id": "CSAFPID-1674629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.2", "product": { "name": "communications___23.4.2", "product_id": "CSAFPID-1670442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.3", "product": { "name": "communications___23.4.3", "product_id": "CSAFPID-1635325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.4", "product": { "name": "communications___23.4.4", "product_id": "CSAFPID-1635326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.5", "product": { "name": "communications___23.4.5", "product_id": "CSAFPID-1674645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.6", "product": { "name": "communications___23.4.6", "product_id": "CSAFPID-1674646", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___24.2.0", "product": { "name": "communications___24.2.0", "product_id": "CSAFPID-1674644", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___7.2.1.0.0", "product": { "name": "communications___7.2.1.0.0", "product_id": "CSAFPID-1670441", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.6", "product": { "name": "communications___8.6.0.6", "product_id": "CSAFPID-1635327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.8", "product": { "name": "communications___8.6.0.8", "product_id": "CSAFPID-1635328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.2", "product": { "name": "communications___9.0.2", "product_id": "CSAFPID-1670440", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.3", "product": { "name": "communications___9.0.3", "product_id": "CSAFPID-1635329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.1.1.8.0", "product": { "name": "communications___9.1.1.8.0", "product_id": "CSAFPID-1674643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___12.0.6.0.0", "product": { "name": "communications_applications___12.0.6.0.0", "product_id": "CSAFPID-1674627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___5.5.22", "product": { "name": "communications_applications___5.5.22", "product_id": "CSAFPID-1674626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.3", "product": { "name": "communications_applications___6.0.3", "product_id": "CSAFPID-1674628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.4", "product": { "name": "communications_applications___6.0.4", "product_id": "CSAFPID-1674624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.5", "product": { "name": "communications_applications___6.0.5", "product_id": "CSAFPID-1674625", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-1673475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-764735", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1650734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-816793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-912557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product": { "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product_id": "CSAFPID-219835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-764247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-41194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1650820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-765241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-498607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-912556", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-764736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-220190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-391501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-440102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-89545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180215", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180197", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220057", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220055", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1503577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673416", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-2045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-40612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-608629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-93784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-41111", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1685", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-493445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-294401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220459", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45184", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45181", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611403", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1650752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1673396", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-912066", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1503323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673526", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-165550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-93546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-180195", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-40299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-187447", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45186", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45185", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220559", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-912085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1503578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673421", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673420", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-764825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-912068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-1503579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-180201", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-760687", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-40947", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-93635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-503534", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-90018", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-94290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-614513", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-643776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-816772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-912076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1503580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40613", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-2044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40301", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-180194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449747", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-223527", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449746", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-503493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-260394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-219838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-611387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-618156", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-816773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1673473", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1503581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912539", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912540", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912541", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912542", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912543", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40611", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40609", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-180198", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41110", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-760688", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-493444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-93633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220056", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-223511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-216017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220918", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614514", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816346", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1503322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-40608", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-180199", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-41113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816348", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-912545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816347", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-764240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220468", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-2310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180200", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90020", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90015", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220133", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1650751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-912069", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-765371", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180216", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180202", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93653", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40949", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-642000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-90021", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-218028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220910", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-611401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-816778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-614517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1503582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-40610", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-611587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642002", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-493443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1672767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180217", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180196", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-165576", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40297", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589926", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40948", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90019", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-220326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816349", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1673399", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-764737", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-224787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-220189", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764827", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-764734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-426842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-345031", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-204635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-764833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-224793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-816794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-342793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1650777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-764248", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-816350", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-1672764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_data_model", "product": { "name": "communications_data_model", "product_id": "CSAFPID-764902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-765372", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-342799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-165544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704410", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-41183", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-342802", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-764829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1503588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1892", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1891", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1884", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1885", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1882", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1883", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1879", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1880", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-40293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-611413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912551", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-1673417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-765369", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-204528", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_ftp_table_base_retrieval", "product": { "name": "communications_eagle_ftp_table_base_retrieval", "product_id": "CSAFPID-204623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765366", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765365", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_elastic_charging_engine", "product": { "name": "communications_elastic_charging_engine", "product_id": "CSAFPID-764834", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-764242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9226", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-8845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-2286", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204464", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-345038", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-611422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-816780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_evolved_communications_application_server", "product": { "name": "communications_evolved_communications_application_server", "product_id": "CSAFPID-204645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-912553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-207586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-234306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-219803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-387664", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_interactive_session_recorder", "product": { "name": "communications_interactive_session_recorder", "product_id": "CSAFPID-1893", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-204622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-219909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_lsms", "product": { "name": "communications_lsms", "product_id": "CSAFPID-1673065", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-764835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-375182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-816351", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-41182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-611595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-226017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-220167", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816353", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-764243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816352", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1673414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-342803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1650778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-764249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-816354", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-204563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-220125", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-245244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-219776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-204554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-765242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-9489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-110249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-93781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-220132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-912079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-219898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-221118", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-179774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-1673496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence", "product": { "name": "communications_performance_intelligence", "product_id": "CSAFPID-1503591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center", "product": { "name": "communications_performance_intelligence_center", "product_id": "CSAFPID-1673485", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765367", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765368", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-764830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-573035", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-45192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-611406", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-764738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-816355", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816358", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816357", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-912558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_services_gatekeeper", "product": { "name": "communications_services_gatekeeper", "product_id": "CSAFPID-608630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503593", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1672762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503594", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-342804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-704413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-166028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2288", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2282", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2285", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2279", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-204634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-345039", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-611423", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-816791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-342805", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-704414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-166027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2295", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2287", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2283", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2284", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2280", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2281", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-220414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-204607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-240600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673381", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1650731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673530", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-764901", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-614089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-764739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204614", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-8984", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-219826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-912073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-110243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-205759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503596", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503598", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-76994", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-568240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-355340", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-912080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1673481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-912554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611408", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-703515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611407", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-204456", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37137", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2021-37137" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2022-23437", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-704410", "CSAFPID-704411", "CSAFPID-704412", "CSAFPID-226017", "CSAFPID-179774", "CSAFPID-219898", "CSAFPID-219826", "CSAFPID-204569", "CSAFPID-204510", "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-220548", "CSAFPID-608629", "CSAFPID-93784", "CSAFPID-41111", "CSAFPID-1685", "CSAFPID-493445", "CSAFPID-294401", "CSAFPID-220547", "CSAFPID-764824", "CSAFPID-220459", "CSAFPID-764825", "CSAFPID-93635", "CSAFPID-503534", "CSAFPID-503493", "CSAFPID-493444", "CSAFPID-93633", "CSAFPID-260395", "CSAFPID-260393", "CSAFPID-220468", "CSAFPID-93636", "CSAFPID-93634", "CSAFPID-589926", "CSAFPID-179780", "CSAFPID-589925", "CSAFPID-179779", "CSAFPID-764826", "CSAFPID-764827", "CSAFPID-764828", "CSAFPID-764829", "CSAFPID-764830", "CSAFPID-220190", "CSAFPID-220189", "CSAFPID-764833", "CSAFPID-41183", "CSAFPID-764834", "CSAFPID-234306", "CSAFPID-764835", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-40949", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-204635", "CSAFPID-41182", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-1899", "CSAFPID-40299", "CSAFPID-1900", "CSAFPID-180194", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-110243", "CSAFPID-765241", "CSAFPID-209546", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180217", "CSAFPID-180196", "CSAFPID-40612", "CSAFPID-180201", "CSAFPID-180216", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-40608", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-2310", "CSAFPID-93547", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673065", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-23437", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json" } ], "title": "CVE-2022-23437" }, { "cve": "CVE-2022-36760", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-36760" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2953", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3635", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "other", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "other", "text": "Uncaught Exception", "title": "CWE-248" } ], "product_status": { "known_affected": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] }, "references": [ { "category": "self", "summary": "CVE-2023-3635", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] } ], "title": "CVE-2023-3635" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-6597", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6597", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6816", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-43642", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] }, "references": [ { "category": "self", "summary": "CVE-2023-43642", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] } ], "title": "CVE-2023-43642" }, { "cve": "CVE-2023-46136", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-46136" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-52428" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2398", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-5971", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-5971" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6387", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Signal Handler Race Condition", "title": "CWE-364" } ], "product_status": { "known_affected": [ "CSAFPID-1503595", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json" } ], "title": "CVE-2024-6387" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-29736", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-29736" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30251", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-30251" }, { "cve": "CVE-2024-31080", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json" } ], "title": "CVE-2024-31080" }, { "cve": "CVE-2024-31744", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31744", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-31744" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-39689", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39689", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] } ], "title": "CVE-2024-39689" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-41817", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] } ], "title": "CVE-2024-41817" }, { "cve": "CVE-2024-43044", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-43044" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-45492" } ] }
ncsc-2024-0414
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:17
Modified
2024-10-17 13:17
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van gegevens
- Uitvoer van willekeurige code (Gebruikersrechten)
- Uitvoer van willekeurige code (Administratorrechten)
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-122
Heap-based Buffer Overflow
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-20
Improper Input Validation
CWE-466
Return of Pointer Value Outside of Expected Range
CWE-606
Unchecked Input for Loop Condition
CWE-390
Detection of Error Condition Without Action
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-222
Truncation of Security-relevant Information
CWE-364
Signal Handler Race Condition
CWE-450
Multiple Interpretations of UI Input
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-772
Missing Release of Resource after Effective Lifetime
CWE-669
Incorrect Resource Transfer Between Spheres
CWE-126
Buffer Over-read
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-349
Acceptance of Extraneous Untrusted Data With Trusted Data
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-703
Improper Check or Handling of Exceptional Conditions
CWE-427
Uncontrolled Search Path Element
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CWE-195
Signed to Unsigned Conversion Error
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-459
Incomplete Cleanup
CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-248
Uncaught Exception
CWE-674
Uncontrolled Recursion
CWE-918
Server-Side Request Forgery (SSRF)
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Signal Handler Race Condition", "title": "CWE-364" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "general", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Uncaught Exception", "title": "CWE-248" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-10-17T13:17:52.103171Z", "id": "NCSC-2024-0414", "initial_release_date": "2024-10-17T13:17:52.103171Z", "revision_history": [ { "date": "2024-10-17T13:17:52.103171Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670439", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670429", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670435", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670431", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670436", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670432", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674642", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670434", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674637", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670438", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635315", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674641", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1670437", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1674634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635308", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications", "product": { "name": "communications", "product_id": "CSAFPID-1635309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications__10.4.0.4", "product": { "name": "communications__10.4.0.4", "product_id": "CSAFPID-1674629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.2", "product": { "name": "communications___23.4.2", "product_id": "CSAFPID-1670442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.3", "product": { "name": "communications___23.4.3", "product_id": "CSAFPID-1635325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.4", "product": { "name": "communications___23.4.4", "product_id": "CSAFPID-1635326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.5", "product": { "name": "communications___23.4.5", "product_id": "CSAFPID-1674645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___23.4.6", "product": { "name": "communications___23.4.6", "product_id": "CSAFPID-1674646", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___24.2.0", "product": { "name": "communications___24.2.0", "product_id": "CSAFPID-1674644", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___7.2.1.0.0", "product": { "name": "communications___7.2.1.0.0", "product_id": "CSAFPID-1670441", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.6", "product": { "name": "communications___8.6.0.6", "product_id": "CSAFPID-1635327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___8.6.0.8", "product": { "name": "communications___8.6.0.8", "product_id": "CSAFPID-1635328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.2", "product": { "name": "communications___9.0.2", "product_id": "CSAFPID-1670440", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.0.3", "product": { "name": "communications___9.0.3", "product_id": "CSAFPID-1635329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications___9.1.1.8.0", "product": { "name": "communications___9.1.1.8.0", "product_id": "CSAFPID-1674643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications", "product": { "name": "communications_applications", "product_id": "CSAFPID-1674620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___12.0.6.0.0", "product": { "name": "communications_applications___12.0.6.0.0", "product_id": "CSAFPID-1674627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___5.5.22", "product": { "name": "communications_applications___5.5.22", "product_id": "CSAFPID-1674626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.3", "product": { "name": "communications_applications___6.0.3", "product_id": "CSAFPID-1674628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.4", "product": { "name": "communications_applications___6.0.4", "product_id": "CSAFPID-1674624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_applications___6.0.5", "product": { "name": "communications_applications___6.0.5", "product_id": "CSAFPID-1674625", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-1673475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-764735", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-1650734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204639", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-204627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-816793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management", "product": { "name": "communications_billing_and_revenue_management", "product_id": "CSAFPID-912557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product": { "name": "communications_billing_and_revenue_management__-_elastic_charging_engine", "product_id": "CSAFPID-219835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-764247", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-41194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-1650820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-765241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-209550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-498607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_brm_-_elastic_charging_engine", "product": { "name": "communications_brm_-_elastic_charging_engine", "product_id": "CSAFPID-912556", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-764736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_calendar_server", "product": { "name": "communications_calendar_server", "product_id": "CSAFPID-220190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-391501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_configuration_console", "product": { "name": "communications_cloud_native_configuration_console", "product_id": "CSAFPID-440102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-89545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180215", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-180197", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-41515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220057", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220055", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-220909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-816767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1503577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673416", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_automated_test_suite", "product": { "name": "communications_cloud_native_core_automated_test_suite", "product_id": "CSAFPID-1673411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764237", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-2045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-40612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-608629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-93784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-41111", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1685", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-493445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-294401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-764824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-220459", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45184", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-45181", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611403", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-611404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1650752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1673396", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-912066", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_binding_support_function", "product": { "name": "communications_cloud_native_core_binding_support_function", "product_id": "CSAFPID-1503323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673526", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_certificate_management", "product": { "name": "communications_cloud_native_core_certificate_management", "product_id": "CSAFPID-1673394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-165550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-93546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-180195", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-40299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-187447", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45186", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-45185", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220559", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-220558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-764239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-816769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-912085", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1503578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_console", "product": { "name": "communications_cloud_native_core_console", "product_id": "CSAFPID-1673390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673421", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_dbtier", "product": { "name": "communications_cloud_native_core_dbtier", "product_id": "CSAFPID-1673420", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-764825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-816771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-912068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_data_analytics_function", "product": { "name": "communications_cloud_native_core_network_data_analytics_function", "product_id": "CSAFPID-1503579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-180201", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-760687", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-40947", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-93635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-503534", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-90018", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-94290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-220325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-614513", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-643776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-816772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-912076", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_exposure_function", "product": { "name": "communications_cloud_native_core_network_exposure_function", "product_id": "CSAFPID-1503580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40613", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-2044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40301", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-180194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449747", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-40298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-223527", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-449746", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-503493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-260394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-219838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-611387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-618156", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-816773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1673473", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-1503581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912539", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912540", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912541", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912542", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product": { "name": "communications_cloud_native_core_network_function_cloud_native_environment", "product_id": "CSAFPID-912543", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40611", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-40609", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-180198", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-41110", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-760688", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-493444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-93633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220056", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-223511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-216017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614516", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-220918", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-614514", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816346", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912077", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1503322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-1673415", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-816775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_repository_function", "product": { "name": "communications_cloud_native_core_network_repository_function", "product_id": "CSAFPID-912544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-40608", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-180199", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-41113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-260393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816348", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-912545", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816347", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-1673501", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_network_slice_selection_function", "product": { "name": "communications_cloud_native_core_network_slice_selection_function", "product_id": "CSAFPID-816777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-764240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220468", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-2310", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180200", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-180193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-93636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90020", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-90015", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-220133", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1650751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-1673395", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-912069", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_policy", "product": { "name": "communications_cloud_native_core_policy", "product_id": "CSAFPID-765371", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180216", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-180202", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93653", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-40949", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-642000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-93634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-90021", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-218028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-94291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220910", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-220324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-611401", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-816778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-614517", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912547", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1503582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-1673393", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_security_edge_protection_proxy", "product": { "name": "communications_cloud_native_core_security_edge_protection_proxy", "product_id": "CSAFPID-912546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-40610", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-611587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642002", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-493443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-642001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-224795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912548", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-912549", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1503585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_service_communication_proxy", "product": { "name": "communications_cloud_native_core_service_communication_proxy", "product_id": "CSAFPID-1672767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180217", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-180196", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-165576", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40297", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764899", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589926", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-40948", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-589925", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-179779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90019", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-90016", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-220326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-764241", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912078", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816349", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-912550", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1503587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-1673399", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_cloud_native_core_unified_data_repository", "product": { "name": "communications_cloud_native_core_unified_data_repository", "product_id": "CSAFPID-816779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-764737", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-224787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_contacts_server", "product": { "name": "communications_contacts_server", "product_id": "CSAFPID-220189", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764827", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server", "product": { "name": "communications_converged_application_server", "product_id": "CSAFPID-764828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-764734", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_application_server_-_service_controller", "product": { "name": "communications_converged_application_server_-_service_controller", "product_id": "CSAFPID-426842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_converged_charging_system", "product": { "name": "communications_converged_charging_system", "product_id": "CSAFPID-1503600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-345031", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-204635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-764833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-224793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergence", "product": { "name": "communications_convergence", "product_id": "CSAFPID-816794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-342793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1650777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-764248", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-816350", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_convergent_charging_controller", "product": { "name": "communications_convergent_charging_controller", "product_id": "CSAFPID-1261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-110242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-1672764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_core_session_manager", "product": { "name": "communications_core_session_manager", "product_id": "CSAFPID-93772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_data_model", "product": { "name": "communications_data_model", "product_id": "CSAFPID-764902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-765372", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-342799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704412", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704411", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-165544", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-704410", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_design_studio", "product": { "name": "communications_design_studio", "product_id": "CSAFPID-41183", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-342802", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_intelligence_hub", "product": { "name": "communications_diameter_intelligence_hub", "product_id": "CSAFPID-764829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1503588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1892", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1891", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1889", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1884", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1885", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1882", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1883", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1879", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1880", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-40293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-1650830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-611413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912551", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_diameter_signaling_router", "product": { "name": "communications_diameter_signaling_router", "product_id": "CSAFPID-912552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-1673417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_application_processor", "product": { "name": "communications_eagle_application_processor", "product_id": "CSAFPID-765369", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-1503317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_element_management_system", "product": { "name": "communications_eagle_element_management_system", "product_id": "CSAFPID-204528", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_ftp_table_base_retrieval", "product": { "name": "communications_eagle_ftp_table_base_retrieval", "product_id": "CSAFPID-204623", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_lnp_application_processor", "product": { "name": "communications_eagle_lnp_application_processor", "product_id": "CSAFPID-352632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765366", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_eagle_software", "product": { "name": "communications_eagle_software", "product_id": "CSAFPID-765365", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_elastic_charging_engine", "product": { "name": "communications_elastic_charging_engine", "product_id": "CSAFPID-764834", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-764242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9226", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-9070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-8845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204624", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-2286", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-204464", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-345038", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-611422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-93630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_element_manager", "product": { "name": "communications_element_manager", "product_id": "CSAFPID-816780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_evolved_communications_application_server", "product": { "name": "communications_evolved_communications_application_server", "product_id": "CSAFPID-204645", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-816782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_fraud_monitor", "product": { "name": "communications_fraud_monitor", "product_id": "CSAFPID-912553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-207586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-234306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-219803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_instant_messaging_server", "product": { "name": "communications_instant_messaging_server", "product_id": "CSAFPID-387664", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_interactive_session_recorder", "product": { "name": "communications_interactive_session_recorder", "product_id": "CSAFPID-1893", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-204622", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_ip_service_activator", "product": { "name": "communications_ip_service_activator", "product_id": "CSAFPID-219909", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_lsms", "product": { "name": "communications_lsms", "product_id": "CSAFPID-1673065", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-764835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-375182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-816351", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_messaging_server", "product": { "name": "communications_messaging_server", "product_id": "CSAFPID-41182", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-611595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_metasolv_solution", "product": { "name": "communications_metasolv_solution", "product_id": "CSAFPID-226017", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-220167", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816353", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-764243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816352", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1503590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-1673414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_analytics_data_director", "product": { "name": "communications_network_analytics_data_director", "product_id": "CSAFPID-816788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-342803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1650778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-1266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-764249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-816354", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_charging_and_control", "product": { "name": "communications_network_charging_and_control", "product_id": "CSAFPID-204563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-220125", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-245244", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-219776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_network_integrity", "product": { "name": "communications_network_integrity", "product_id": "CSAFPID-204554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_offline_mediation_controller", "product": { "name": "communications_offline_mediation_controller", "product_id": "CSAFPID-765242", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-9489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-110249", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-93781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-220132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_operations_monitor", "product": { "name": "communications_operations_monitor", "product_id": "CSAFPID-912079", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-219898", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-224790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-221118", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-179774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_order_and_service_management", "product": { "name": "communications_order_and_service_management", "product_id": "CSAFPID-1673496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence", "product": { "name": "communications_performance_intelligence", "product_id": "CSAFPID-1503591", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center", "product": { "name": "communications_performance_intelligence_center", "product_id": "CSAFPID-1673485", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765367", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-765368", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_performance_intelligence_center__pic__software", "product": { "name": "communications_performance_intelligence_center__pic__software", "product_id": "CSAFPID-764830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-573035", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-45192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-611406", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_policy_management", "product": { "name": "communications_policy_management", "product_id": "CSAFPID-816790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-764738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-204590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_pricing_design_center", "product": { "name": "communications_pricing_design_center", "product_id": "CSAFPID-816355", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816359", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816358", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816357", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-912558", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-1503602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_service_catalog_and_design", "product": { "name": "communications_service_catalog_and_design", "product_id": "CSAFPID-816797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_services_gatekeeper", "product": { "name": "communications_services_gatekeeper", "product_id": "CSAFPID-608630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503592", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503593", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1672762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-40291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503594", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_border_controller", "product": { "name": "communications_session_border_controller", "product_id": "CSAFPID-1503595", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-342804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-704413", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-166028", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2292", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2288", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2282", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2285", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-2279", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-204634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-345039", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-611423", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-93631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_report_manager", "product": { "name": "communications_session_report_manager", "product_id": "CSAFPID-816791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-342805", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-704414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-166027", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2295", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2287", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2283", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2284", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2280", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-2281", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-220414", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_route_manager", "product": { "name": "communications_session_route_manager", "product_id": "CSAFPID-204607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_session_router", "product": { "name": "communications_session_router", "product_id": "CSAFPID-764781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_subscriber-aware_load_balancer", "product": { "name": "communications_subscriber-aware_load_balancer", "product_id": "CSAFPID-93774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-240600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673070", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673381", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1650731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673530", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-764901", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-78761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-614089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_assurance", "product": { "name": "communications_unified_assurance", "product_id": "CSAFPID-1673068", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-764739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204614", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-8984", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-204569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-219826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_inventory_management", "product": { "name": "communications_unified_inventory_management", "product_id": "CSAFPID-912073", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-110243", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_unified_session_manager", "product": { "name": "communications_unified_session_manager", "product_id": "CSAFPID-205759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503596", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503597", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1503598", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764900", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-76994", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-568240", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-764782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-355340", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-912080", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_user_data_repository", "product": { "name": "communications_user_data_repository", "product_id": "CSAFPID-1673481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-912554", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611408", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-703515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-611407", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_webrtc_session_controller", "product": { "name": "communications_webrtc_session_controller", "product_id": "CSAFPID-204456", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37137", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-41182", "CSAFPID-209546", "CSAFPID-40608", "CSAFPID-180216", "CSAFPID-93547", "CSAFPID-180217", "CSAFPID-2310", "CSAFPID-40612", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-1899", "CSAFPID-41111", "CSAFPID-40299", "CSAFPID-187447", "CSAFPID-1900", "CSAFPID-40301", "CSAFPID-180194", "CSAFPID-40298", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-40300", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-40294", "CSAFPID-110243", "CSAFPID-204629", "CSAFPID-765241", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-41183", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-1893", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-204456", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-204645", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180196", "CSAFPID-180201", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-764739", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204635", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673381", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2021-37137" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-40949", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45182", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-216017", "CSAFPID-764240", "CSAFPID-90021", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-94291", "CSAFPID-493443", "CSAFPID-224796", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-40293", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-93781", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-342793", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-342803", "CSAFPID-204563", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-764735", "CSAFPID-204635", "CSAFPID-41183", "CSAFPID-234306", "CSAFPID-41182", "CSAFPID-226017", "CSAFPID-219898", "CSAFPID-179774", "CSAFPID-764738", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-220547", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-93636", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2601", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-2601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-2601" }, { "cve": "CVE-2022-23437", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-704410", "CSAFPID-704411", "CSAFPID-704412", "CSAFPID-226017", "CSAFPID-179774", "CSAFPID-219898", "CSAFPID-219826", "CSAFPID-204569", "CSAFPID-204510", "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-220548", "CSAFPID-608629", "CSAFPID-93784", "CSAFPID-41111", "CSAFPID-1685", "CSAFPID-493445", "CSAFPID-294401", "CSAFPID-220547", "CSAFPID-764824", "CSAFPID-220459", "CSAFPID-764825", "CSAFPID-93635", "CSAFPID-503534", "CSAFPID-503493", "CSAFPID-493444", "CSAFPID-93633", "CSAFPID-260395", "CSAFPID-260393", "CSAFPID-220468", "CSAFPID-93636", "CSAFPID-93634", "CSAFPID-589926", "CSAFPID-179780", "CSAFPID-589925", "CSAFPID-179779", "CSAFPID-764826", "CSAFPID-764827", "CSAFPID-764828", "CSAFPID-764829", "CSAFPID-764830", "CSAFPID-220190", "CSAFPID-220189", "CSAFPID-764833", "CSAFPID-41183", "CSAFPID-764834", "CSAFPID-234306", "CSAFPID-764835", "CSAFPID-187447", "CSAFPID-760687", "CSAFPID-40947", "CSAFPID-2044", "CSAFPID-449747", "CSAFPID-40301", "CSAFPID-449746", "CSAFPID-40298", "CSAFPID-223527", "CSAFPID-760688", "CSAFPID-40300", "CSAFPID-93653", "CSAFPID-40949", "CSAFPID-642000", "CSAFPID-642002", "CSAFPID-642001", "CSAFPID-165576", "CSAFPID-764899", "CSAFPID-40948", "CSAFPID-426842", "CSAFPID-93630", "CSAFPID-204645", "CSAFPID-1893", "CSAFPID-40294", "CSAFPID-93631", "CSAFPID-764900", "CSAFPID-568240", "CSAFPID-355340", "CSAFPID-703515", "CSAFPID-204456", "CSAFPID-204635", "CSAFPID-41182", "CSAFPID-764901", "CSAFPID-764902", "CSAFPID-1899", "CSAFPID-40299", "CSAFPID-1900", "CSAFPID-180194", "CSAFPID-41112", "CSAFPID-41110", "CSAFPID-41113", "CSAFPID-180193", "CSAFPID-1898", "CSAFPID-611587", "CSAFPID-40297", "CSAFPID-110244", "CSAFPID-110242", "CSAFPID-9489", "CSAFPID-110249", "CSAFPID-110243", "CSAFPID-765241", "CSAFPID-209546", "CSAFPID-207586", "CSAFPID-765242", "CSAFPID-205759", "CSAFPID-765365", "CSAFPID-765366", "CSAFPID-342804", "CSAFPID-342805", "CSAFPID-1882", "CSAFPID-573035", "CSAFPID-765367", "CSAFPID-765368", "CSAFPID-764242", "CSAFPID-76994", "CSAFPID-204623", "CSAFPID-352633", "CSAFPID-352632", "CSAFPID-765369", "CSAFPID-204528", "CSAFPID-342802", "CSAFPID-40610", "CSAFPID-40611", "CSAFPID-40609", "CSAFPID-180198", "CSAFPID-180217", "CSAFPID-180196", "CSAFPID-40612", "CSAFPID-180201", "CSAFPID-180216", "CSAFPID-180202", "CSAFPID-40613", "CSAFPID-40608", "CSAFPID-180199", "CSAFPID-93546", "CSAFPID-180195", "CSAFPID-2310", "CSAFPID-93547", "CSAFPID-180200", "CSAFPID-765371", "CSAFPID-89545", "CSAFPID-180215", "CSAFPID-180197", "CSAFPID-204639", "CSAFPID-204627", "CSAFPID-342799", "CSAFPID-765372", "CSAFPID-220125", "CSAFPID-245244", "CSAFPID-204554", "CSAFPID-204614", "CSAFPID-345031", "CSAFPID-204595", "CSAFPID-204590", "CSAFPID-224787", "CSAFPID-1673065", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-23437", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json" } ], "title": "CVE-2022-23437" }, { "cve": "CVE-2022-36760", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-220057", "CSAFPID-220055", "CSAFPID-220909", "CSAFPID-45184", "CSAFPID-45182", "CSAFPID-220559", "CSAFPID-220558", "CSAFPID-220327", "CSAFPID-220325", "CSAFPID-219838", "CSAFPID-220056", "CSAFPID-223511", "CSAFPID-216017", "CSAFPID-220889", "CSAFPID-220918", "CSAFPID-90020", "CSAFPID-90015", "CSAFPID-220133", "CSAFPID-220561", "CSAFPID-90021", "CSAFPID-220881", "CSAFPID-94291", "CSAFPID-220910", "CSAFPID-220324", "CSAFPID-224796", "CSAFPID-224795", "CSAFPID-220326", "CSAFPID-764734", "CSAFPID-40293", "CSAFPID-220167", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764736", "CSAFPID-764737", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-704412", "CSAFPID-704411", "CSAFPID-704410", "CSAFPID-219803", "CSAFPID-375182", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-219776", "CSAFPID-224791", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-764738", "CSAFPID-240600", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-391501", "CSAFPID-440102", "CSAFPID-41516", "CSAFPID-41515", "CSAFPID-764237", "CSAFPID-45181", "CSAFPID-45186", "CSAFPID-45185", "CSAFPID-90018", "CSAFPID-94290", "CSAFPID-260394", "CSAFPID-764240", "CSAFPID-94292", "CSAFPID-218028", "CSAFPID-493443", "CSAFPID-90019", "CSAFPID-90016", "CSAFPID-93777", "CSAFPID-93772", "CSAFPID-345038", "CSAFPID-93629", "CSAFPID-45192", "CSAFPID-608630", "CSAFPID-40292", "CSAFPID-40291", "CSAFPID-345039", "CSAFPID-93628", "CSAFPID-764780", "CSAFPID-764781", "CSAFPID-93775", "CSAFPID-93774", "CSAFPID-764782", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-204563", "CSAFPID-8984", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2022-36760" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2953", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3635", "cwe": { "id": "CWE-195", "name": "Signed to Unsigned Conversion Error" }, "notes": [ { "category": "other", "text": "Signed to Unsigned Conversion Error", "title": "CWE-195" }, { "category": "other", "text": "Uncaught Exception", "title": "CWE-248" } ], "product_status": { "known_affected": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] }, "references": [ { "category": "self", "summary": "CVE-2023-3635", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-204622", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-219909", "CSAFPID-220558", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611401", "CSAFPID-611406", "CSAFPID-611407", "CSAFPID-611408", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-614513", "CSAFPID-614514", "CSAFPID-614515", "CSAFPID-614516", "CSAFPID-614517", "CSAFPID-618156", "CSAFPID-643776", "CSAFPID-764237", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-764240", "CSAFPID-764241", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-764249", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242" ] } ], "title": "CVE-2023-3635" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816352", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-342804", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-224793", "CSAFPID-816794", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-219803", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-240600", "CSAFPID-342803", "CSAFPID-611595", "CSAFPID-764738", "CSAFPID-816351", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-912073", "CSAFPID-912558" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-6597", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6597", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2023-6597" }, { "cve": "CVE-2023-6816", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-6816" }, { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-38408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-45182", "CSAFPID-40293", "CSAFPID-611406", "CSAFPID-764237", "CSAFPID-220558", "CSAFPID-764238", "CSAFPID-764239", "CSAFPID-614513", "CSAFPID-643776", "CSAFPID-611387", "CSAFPID-618156", "CSAFPID-614516", "CSAFPID-614515", "CSAFPID-614514", "CSAFPID-764240", "CSAFPID-94291", "CSAFPID-611401", "CSAFPID-614517", "CSAFPID-764241", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-764243", "CSAFPID-342804", "CSAFPID-611408", "CSAFPID-611407", "CSAFPID-764247", "CSAFPID-764248", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-611595", "CSAFPID-764249", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-240600", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-38408" }, { "cve": "CVE-2023-43642", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] }, "references": [ { "category": "self", "summary": "CVE-2023-43642", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-1673395", "CSAFPID-94291", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797" ] } ], "title": "CVE-2023-43642" }, { "cve": "CVE-2023-46136", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673411", "CSAFPID-912549", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-220132", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2023-46136" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-219838", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816346", "CSAFPID-816776", "CSAFPID-816348", "CSAFPID-816777", "CSAFPID-816347", "CSAFPID-94291", "CSAFPID-816778", "CSAFPID-614517", "CSAFPID-816779", "CSAFPID-816349", "CSAFPID-40293", "CSAFPID-764242", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816353", "CSAFPID-816786", "CSAFPID-816352", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-224793", "CSAFPID-342793", "CSAFPID-1265", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-219803", "CSAFPID-816351", "CSAFPID-611595", "CSAFPID-342803", "CSAFPID-1266", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673417", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-90016", "CSAFPID-764826", "CSAFPID-345038", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-93781", "CSAFPID-345039", "CSAFPID-912080", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-611413", "CSAFPID-240600", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-8984", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-1503601", "CSAFPID-1503602" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912073", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912102", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2023-52428" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2398", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Resource after Effective Lifetime", "title": "CWE-772" }, { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" } ], "product_status": { "known_affected": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2398", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-2398" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-5971", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1673399", "CSAFPID-1673526", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-5971" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-6387", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "other", "text": "Signal Handler Race Condition", "title": "CWE-364" } ], "product_status": { "known_affected": [ "CSAFPID-1503595", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json" } ], "title": "CVE-2024-6387" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673530", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-912101", "CSAFPID-1673473", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673475", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-224795", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650820", "CSAFPID-1650751", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650734", "CSAFPID-1650830", "CSAFPID-1650777", "CSAFPID-204622", "CSAFPID-219909", "CSAFPID-1650778", "CSAFPID-41182", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650826", "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650751", "CSAFPID-1650752", "CSAFPID-1673481", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25638", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "other", "text": "Acceptance of Extraneous Untrusted Data With Trusted Data", "title": "CWE-349" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25638", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.9, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-25638" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1673485", "CSAFPID-1673393", "CSAFPID-1673394", "CSAFPID-1673389", "CSAFPID-1672767", "CSAFPID-1673391", "CSAFPID-1673392", "CSAFPID-1673415", "CSAFPID-1673390", "CSAFPID-1673413", "CSAFPID-1673395", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-29736", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29736", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673399", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-29736" }, { "cve": "CVE-2024-29857", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673413", "CSAFPID-1673415", "CSAFPID-1673501", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569" ] } ], "title": "CVE-2024-29857" }, { "cve": "CVE-2024-30251", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-30251" }, { "cve": "CVE-2024-31080", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json" } ], "title": "CVE-2024-31080" }, { "cve": "CVE-2024-31744", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31744", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673392", "CSAFPID-1673393", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-31744" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37891", "cwe": { "id": "CWE-669", "name": "Incorrect Resource Transfer Between Spheres" }, "notes": [ { "category": "other", "text": "Incorrect Resource Transfer Between Spheres", "title": "CWE-669" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37891", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-37891" }, { "cve": "CVE-2024-38816", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38816", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-38816" }, { "cve": "CVE-2024-39689", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39689", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673393" ] } ], "title": "CVE-2024-39689" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673516", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1650731", "CSAFPID-1673382", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-41817", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41817", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1674625" ] } ], "title": "CVE-2024-41817" }, { "cve": "CVE-2024-43044", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" } ], "product_status": { "known_affected": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673395", "CSAFPID-1673411", "CSAFPID-1673412", "CSAFPID-1673413", "CSAFPID-1673396", "CSAFPID-1673392", "CSAFPID-1673494", "CSAFPID-1673393", "CSAFPID-1673415", "CSAFPID-1673416", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-43044" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646" ] } ], "title": "CVE-2024-45492" } ] }
WID-SEC-W-2024-0127
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2024-05-21 22:00
Summary
X.Org X11: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0127 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0127.json" }, { "category": "self", "summary": "WID-SEC-2024-0127 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0127" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0212-1 vom 2024-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:0607 vom 2024-02-12", "url": "https://errata.build.resf.org/RLSA-2024:0607" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0236-1 vom 2024-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3721 vom 2024-01-25", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0320 vom 2024-01-26", "url": "https://lists.centos.org/pipermail/centos-announce/2024-January/099216.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0249-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0251-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0252-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0558 vom 2024-01-30", "url": "http://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0597 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0557 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0614 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0607 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-3 vom 2024-01-30", "url": "https://ubuntu.com/security/notices/USN-6587-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0617 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0621 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0626 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202401-30 vom 2024-01-31", "url": "https://security.gentoo.org/glsa/202401-30" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0557 vom 2024-01-31", "url": "https://linux.oracle.com/errata/ELSA-2024-0557.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0629 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-5 vom 2024-03-13", "url": "https://ubuntu.com/security/notices/USN-6587-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0607 vom 2024-02-01", "url": "http://linux.oracle.com/errata/ELSA-2024-0607.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0629 vom 2024-02-01", "url": "https://linux.oracle.com/errata/ELSA-2024-0629.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-4 vom 2024-02-01", "url": "https://ubuntu.com/security/notices/USN-6587-4" }, { "category": "external", "summary": "X.Org Security Advisory vom 2024-01-16", "url": "https://lists.x.org/archives/xorg/2024-January/061525.html" }, { "category": "external", "summary": "Xming Changes vom 2024-01-16", "url": "http://www.straightrunning.com/XmingNotes/changes.php" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2024-01-16", "url": "https://ubuntu.com/security/notices/USN-6587-1" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-05db4bcbec" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-da3d410b53" }, { "category": "external", "summary": "OpenBSD Patch vom 2024-01-16", "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/012_xserver.patch.sig" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2455 vom 2024-02-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2455.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0111-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0116-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5762D637DD vom 2024-01-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5762d637dd" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0121-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0114-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0109-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0629 vom 2024-02-05", "url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099223.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-2815D55CDF vom 2024-01-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2815d55cdf" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0165-1 vom 2024-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0320 vom 2024-01-22", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0320 vom 2024-01-23", "url": "https://linux.oracle.com/errata/ELSA-2024-0320.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-2 vom 2024-01-22", "url": "https://ubuntu.com/security/notices/USN-6587-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-5603 vom 2024-01-23", "url": "https://lists.debian.org/debian-security-announce/2024/msg00010.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25", "url": "http://linux.oracle.com/errata/ELSA-2024-2037.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30", "url": "https://linux.oracle.com/errata/ELSA-2024-2080.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2169 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2995 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2996 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2996" } ], "source_lang": "en-US", "title": "X.Org X11: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:06:45.631+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0127", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und Fedora aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-01-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-24T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2024-01-28T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von CentOS und SUSE aufgenommen" }, { "date": "2024-01-29T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-01-31T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Gentoo, Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-02-01T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c21.1.11", "product": { "name": "Open Source X.Org X11 \u003c21.1.11", "product_id": "T032211", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:21.1.11" } } }, { "category": "product_version_range", "name": "\u003cXWayland 23.2.4", "product": { "name": "Open Source X.Org X11 \u003cXWayland 23.2.4", "product_id": "T032212", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:xwayland_23.2.4" } } } ], "category": "product_name", "name": "X.Org X11" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "OpenBSD OpenBSD", "product": { "name": "OpenBSD OpenBSD", "product_id": "T024283", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openbsd:-" } } } ], "category": "vendor", "name": "OpenBSD" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T016400", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-21886" } ] }
wid-sec-w-2024-0127
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2024-05-21 22:00
Summary
X.Org X11: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das X Window System dient der Erzeugung grafischer Oberflächen auf Unix Systemen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in X.Org X11 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0127 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0127.json" }, { "category": "self", "summary": "WID-SEC-2024-0127 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0127" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0212-1 vom 2024-01-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2024:0607 vom 2024-02-12", "url": "https://errata.build.resf.org/RLSA-2024:0607" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0236-1 vom 2024-01-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3721 vom 2024-01-25", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0320 vom 2024-01-26", "url": "https://lists.centos.org/pipermail/centos-announce/2024-January/099216.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0249-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0251-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0252-1 vom 2024-01-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0558 vom 2024-01-30", "url": "http://access.redhat.com/errata/RHSA-2024:0558" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0597 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0557 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0614 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0607 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-3 vom 2024-01-30", "url": "https://ubuntu.com/security/notices/USN-6587-3" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0617 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0621 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0626 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202401-30 vom 2024-01-31", "url": "https://security.gentoo.org/glsa/202401-30" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0557 vom 2024-01-31", "url": "https://linux.oracle.com/errata/ELSA-2024-0557.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0629 vom 2024-01-31", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-5 vom 2024-03-13", "url": "https://ubuntu.com/security/notices/USN-6587-5" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0607 vom 2024-02-01", "url": "http://linux.oracle.com/errata/ELSA-2024-0607.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0629 vom 2024-02-01", "url": "https://linux.oracle.com/errata/ELSA-2024-0629.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-4 vom 2024-02-01", "url": "https://ubuntu.com/security/notices/USN-6587-4" }, { "category": "external", "summary": "X.Org Security Advisory vom 2024-01-16", "url": "https://lists.x.org/archives/xorg/2024-January/061525.html" }, { "category": "external", "summary": "Xming Changes vom 2024-01-16", "url": "http://www.straightrunning.com/XmingNotes/changes.php" }, { "category": "external", "summary": "Ubuntu Security Advisory vom 2024-01-16", "url": "https://ubuntu.com/security/notices/USN-6587-1" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-05db4bcbec" }, { "category": "external", "summary": "Fedora Security Advisory vom 2024-01-16", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-da3d410b53" }, { "category": "external", "summary": "OpenBSD Patch vom 2024-01-16", "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/012_xserver.patch.sig" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2455 vom 2024-02-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2455.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0111-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0116-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5762D637DD vom 2024-01-18", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5762d637dd" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0121-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0114-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0109-1 vom 2024-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2024:0629 vom 2024-02-05", "url": "https://lists.centos.org/pipermail/centos-announce/2024-February/099223.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-2815D55CDF vom 2024-01-19", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2815d55cdf" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0165-1 vom 2024-01-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0320 vom 2024-01-22", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0320 vom 2024-01-23", "url": "https://linux.oracle.com/errata/ELSA-2024-0320.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6587-2 vom 2024-01-22", "url": "https://ubuntu.com/security/notices/USN-6587-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-5603 vom 2024-01-23", "url": "https://lists.debian.org/debian-security-announce/2024/msg00010.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25", "url": "http://linux.oracle.com/errata/ELSA-2024-2037.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30", "url": "https://linux.oracle.com/errata/ELSA-2024-2080.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2169 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2995 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2995" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2996 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2996" } ], "source_lang": "en-US", "title": "X.Org X11: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:06:45.631+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0127", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE und Fedora aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-01-21T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-01-24T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE und Debian aufgenommen" }, { "date": "2024-01-28T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von CentOS und SUSE aufgenommen" }, { "date": "2024-01-29T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat und Ubuntu aufgenommen" }, { "date": "2024-01-31T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Gentoo, Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-02-01T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2024-02-12T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-03-13T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c21.1.11", "product": { "name": "Open Source X.Org X11 \u003c21.1.11", "product_id": "T032211", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:21.1.11" } } }, { "category": "product_version_range", "name": "\u003cXWayland 23.2.4", "product": { "name": "Open Source X.Org X11 \u003cXWayland 23.2.4", "product_id": "T032212", "product_identification_helper": { "cpe": "cpe:/a:x:x.org_x11:xwayland_23.2.4" } } } ], "category": "product_name", "name": "X.Org X11" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "OpenBSD OpenBSD", "product": { "name": "OpenBSD OpenBSD", "product_id": "T024283", "product_identification_helper": { "cpe": "cpe:/a:openbsd:openbsd:-" } } } ], "category": "vendor", "name": "OpenBSD" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T016400", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-6816", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-6816" }, { "cve": "CVE-2024-0229", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0229" }, { "cve": "CVE-2024-0408", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0408" }, { "cve": "CVE-2024-0409", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-0409" }, { "cve": "CVE-2024-21885", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-21885" }, { "cve": "CVE-2024-21886", "notes": [ { "category": "description", "text": "In X.Org X11 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Benutzung in Kombination mit \"SELinux\", Fehler bei verschiedenen APIs sowie Fehler im Umgang mit Devices. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T024283", "2951", "T002207", "67646", "T000126", "398363", "T012167", "1727", "T004914", "T016400", "T032255", "74185" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2024-21886" } ] }
ghsa-pcjv-393q-rqf2
Vulnerability from github
Published
2024-01-18 06:30
Modified
2024-05-22 18:30
Severity ?
Details
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
{ "affected": [], "aliases": [ "CVE-2023-6816" ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-18T05:15:08Z", "severity": "HIGH" }, "details": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.", "id": "GHSA-pcjv-393q-rqf2", "modified": "2024-05-22T18:30:39Z", "published": "2024-01-18T06:30:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240307-0006" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-30" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-6816" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2996" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2170" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2169" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0629" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0626" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0621" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0617" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0614" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0607" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0597" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0558" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0557" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0320" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/18/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.