<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for xorg-x11-server</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:0109-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-01-16T12:28:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-01-16T12:28:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-01-16T12:28:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for xorg-x11-server</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for xorg-x11-server fixes the following issues:

Security fixes:

  - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
  - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
  - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
  - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)

Other:

- Fix vmware graphics driver  crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SP5-SAPCAL-Azure-2024-109,Image SLES15-SP5-SAPCAL-EC2-2024-109,Image SLES15-SP5-SAPCAL-GCE-2024-109,SUSE-2024-109,SUSE-SLE-Module-Basesystem-15-SP5-2024-109,SUSE-SLE-Module-Development-Tools-15-SP5-2024-109,openSUSE-SLE-15.5-2024-109</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/</URL>
      <Description>Link for SUSE-SU-2024:0109-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:0109-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218176</URL>
      <Description>SUSE Bug 1218176</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218240</URL>
      <Description>SUSE Bug 1218240</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218582</URL>
      <Description>SUSE Bug 1218582</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218583</URL>
      <Description>SUSE Bug 1218583</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218584</URL>
      <Description>SUSE Bug 1218584</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218585</URL>
      <Description>SUSE Bug 1218585</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-6816/</URL>
      <Description>SUSE CVE CVE-2023-6816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-0229/</URL>
      <Description>SUSE CVE CVE-2024-0229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21885/</URL>
      <Description>SUSE CVE CVE-2024-21885 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-21886/</URL>
      <Description>SUSE CVE CVE-2024-21886 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SP5-SAPCAL-Azure">
      <Branch Type="Product Name" Name="Image SLES15-SP5-SAPCAL-Azure">
        <FullProductName ProductID="Image SLES15-SP5-SAPCAL-Azure">Image SLES15-SP5-SAPCAL-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP5-SAPCAL-EC2">
      <Branch Type="Product Name" Name="Image SLES15-SP5-SAPCAL-EC2">
        <FullProductName ProductID="Image SLES15-SP5-SAPCAL-EC2">Image SLES15-SP5-SAPCAL-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP5-SAPCAL-GCE">
      <Branch Type="Product Name" Name="Image SLES15-SP5-SAPCAL-GCE">
        <FullProductName ProductID="Image SLES15-SP5-SAPCAL-GCE">Image SLES15-SP5-SAPCAL-GCE</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5" CPE="cpe:/o:suse:sle-module-basesystem:15:sp5">SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Development Tools 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Development Tools 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP5" CPE="cpe:/o:suse:sle-module-development-tools:15:sp5">SUSE Linux Enterprise Module for Development Tools 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-21.1.4-150500.7.18.1">
      <FullProductName ProductID="xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">
      <FullProductName ProductID="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-extra-21.1.4-150500.7.18.1">
      <FullProductName ProductID="xorg-x11-server-extra-21.1.4-150500.7.18.1">xorg-x11-server-extra-21.1.4-150500.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-sdk-21.1.4-150500.7.18.1">
      <FullProductName ProductID="xorg-x11-server-sdk-21.1.4-150500.7.18.1">xorg-x11-server-sdk-21.1.4-150500.7.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xorg-x11-server-source-21.1.4-150500.7.18.1">
      <FullProductName ProductID="xorg-x11-server-source-21.1.4-150500.7.18.1">xorg-x11-server-source-21.1.4-150500.7.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="xorg-x11-server-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-Azure">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-Azure">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-EC2">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-EC2">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-GCE">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP5-SAPCAL-GCE">
      <FullProductName ProductID="Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 as a component of Image SLES15-SP5-SAPCAL-GCE</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-extra-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1">xorg-x11-server-extra-21.1.4-150500.7.18.1 as a component of SUSE Linux Enterprise Module for Basesystem 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-sdk-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Development Tools 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1">xorg-x11-server-sdk-21.1.4-150500.7.18.1 as a component of SUSE Linux Enterprise Module for Development Tools 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1">xorg-x11-server-21.1.4-150500.7.18.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1">xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-extra-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1">xorg-x11-server-extra-21.1.4-150500.7.18.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-sdk-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1">xorg-x11-server-sdk-21.1.4-150500.7.18.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="xorg-x11-server-source-21.1.4-150500.7.18.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1">xorg-x11-server-source-21.1.4-150500.7.18.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.</Note>
    </Notes>
    <CVE>CVE-2023-6816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-6816.html</URL>
        <Description>CVE-2023-6816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218582</URL>
        <Description>SUSE Bug 1218582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221590</URL>
        <Description>SUSE Bug 1221590</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.</Note>
    </Notes>
    <CVE>CVE-2024-0229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-0229.html</URL>
        <Description>CVE-2024-0229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218583</URL>
        <Description>SUSE Bug 1218583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221590</URL>
        <Description>SUSE Bug 1221590</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.</Note>
    </Notes>
    <CVE>CVE-2024-21885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21885.html</URL>
        <Description>CVE-2024-21885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218584</URL>
        <Description>SUSE Bug 1218584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221590</URL>
        <Description>SUSE Bug 1221590</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.</Note>
    </Notes>
    <CVE>CVE-2024-21886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>Image SLES15-SP5-SAPCAL-GCE:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.18.1</ProductID>
        <ProductID>openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20240109-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-21886.html</URL>
        <Description>CVE-2024-21886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218585</URL>
        <Description>SUSE Bug 1218585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221590</URL>
        <Description>SUSE Bug 1221590</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
