A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
History
                    04 Aug 2025, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Nov 2024, 08:43
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.6 | 
| References | 
 | |
| References | () https://access.redhat.com/errata/RHSA-2023:7886 - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2024:0006 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0009 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0010 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0014 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0015 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0016 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0017 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0018 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:0020 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:2169 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:2170 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:2995 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:2996 - | |
| References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
| References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
| References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory | 
16 Sep 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
22 May 2024, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
30 Apr 2024, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
31 Jan 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
25 Jan 2024, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
11 Jan 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
02 Jan 2024, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
25 Dec 2023, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Dec 2023, 17:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:tigervnc:tigervnc:-:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | |
| References | () https://access.redhat.com/security/cve/CVE-2023-6478 - Vendor Advisory | |
| References | () https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632 - Patch | |
| References | () https://www.debian.org/security/2023/dsa-5576 - Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html - Mailing List | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/ - Vendor Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2023:7886 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2253298 - Issue Tracking | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/ - Vendor Advisory | |
| References | () https://lists.x.org/archives/xorg-announce/2023-December/003435.html - Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2023/12/13/1 - Mailing List | |
| First Time | Redhat Redhat enterprise Linux Debian debian Linux X.org xwayland Redhat enterprise Linux Eus Tigervnc tigervnc X.org x Server Debian Tigervnc X.org | |
| CWE | CWE-190 | 
20 Dec 2023, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
15 Dec 2023, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Dec 2023, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Dec 2023, 13:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
13 Dec 2023, 10:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-12-13 07:15
Updated : 2025-08-04 21:15
NVD link : CVE-2023-6478
Mitre link : CVE-2023-6478
CVE.ORG link : CVE-2023-6478
JSON object : View
Products Affected
                x.org
- xwayland
- x_server
redhat
- enterprise_linux_eus
- enterprise_linux
debian
- debian_linux
tigervnc
- tigervnc
CWE
                
                    
                        
                        CWE-190
                        
            Integer Overflow or Wraparound
