Gentoo Linux Security Advisory 202305-30 - Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution. Versions greater than or equal to 21.1.8 are affected.
17ea79dd6032266e7320314c13626d60dbbcad16b92d154c8357ae278fff0d4c
Red Hat Security Advisory 2023-2806-01 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
e752c2a311b2b44ab5935acc2634c63609cfd392ca83f3e927e1ef1634e86f7b
Red Hat Security Advisory 2023-2830-01 - Virtual Network Computing is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Issues addressed include out of bounds access and use-after-free vulnerabilities.
7461e585ce64078ce68a4f589ce71fee3152508bcd4f7be76fd18e6bdf08391c
Red Hat Security Advisory 2023-2805-01 - Xwayland is an X server for running X clients under Wayland. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
15c9a4484f23c0f04075b47c30f17c1864a5d56b2fcd1eee528e76e75fd7e870
Red Hat Security Advisory 2023-2248-01 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
9567cfdca22dfb973988e9e80430c5465d61a7d1e712559323577f5ad304876a
Red Hat Security Advisory 2023-2257-01 - Virtual Network Computing is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Issues addressed include out of bounds access and use-after-free vulnerabilities.
318bc2607149b063bd278d6cba76d751e9e5174fa04f5115e433e4c7b53cf9b5
Red Hat Security Advisory 2023-2249-01 - Xwayland is an X server for running X clients under Wayland. Issues addressed include buffer overflow, memory leak, out of bounds access, and use-after-free vulnerabilities.
e50158bf49f4e7e16f7658adc697807c81daa04807dd1e95d5e1e8077c026d4b
Red Hat Security Advisory 2023-0045-01 - Virtual Network Computing is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Issues addressed include out of bounds access and use-after-free vulnerabilities.
b44be7a01e0df67bebb6e2b5ce2713b93f0eca8b9d150b1fda8acef44bd4e455
Red Hat Security Advisory 2023-0046-01 - X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Issues addressed include out of bounds access and use-after-free vulnerabilities.
0c26fecadd9ad673ce37c61040f50966727b4724075c12f9e1247d78890d1945
Debian Linux Security Advisory 5304-1 - Jan-Niklas Sohn discovered several vulnerabilities in X server extensions in the X.Org X server, which may result in privilege escalation if the X server is running privileged.
508f81d2425867fcd49249440c89ccced2f68761180bd7a71e0b59a81c4d5089