File _patchinfo of Package patchinfo.31076
<patchinfo incident="31076">
<issue tracker="cve" id="2023-5574"/>
<issue tracker="cve" id="2023-5380"/>
<issue tracker="cve" id="2023-5367"/>
<issue tracker="bnc" id="1216261">VUL-0: EMBARGOED: CVE-2023-5574: xorg-x11-server: Server Damage Object Use-After-Free Local Privilege Escalation Vulnerability</issue>
<issue tracker="bnc" id="1216133">VUL-0: EMBARGOED: CVE-2023-5380: xorg-x11-server: Use-after-free bug in DestroyWindow</issue>
<issue tracker="bnc" id="1216135">VUL-0: EMBARGOED: CVE-2023-5367: xorg-x11-server,xwayland,libXrandr,xorg-x11-libXrandr: fix handling of PropModeAppend/Prepend</issue>
<packager>sndirsch</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for xorg-x11-server</summary>
<description>This update for xorg-x11-server fixes the following issues:
- CVE-2023-5574: Fixed a privilege escalation issue that could be
triggered via the Damage extension protocol (bsc#1216261).
- CVE-2023-5380: Fixed a memory safety issue that could be triggered
when using multiple protocol screens (bsc#1216133).
- CVE-2023-5367: Fixed a memory safety issue in both the XI2 and RandR
protocols (bsc#1216135).
</description>
</patchinfo>