Ad

CVE-2023-6816

CRITICAL CVSS 3.1: 9.8 EPSS 3.26%
Updated Mar 19, 2026
Debian
Parameter Value
CVSS 9.8 (CRITICAL)
Affected Versions before 23.2.4
Fixed In 21.1.11
Type CWE-787 (Out-of-bounds Write)
Vendor Debian
Public PoC No

A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 7

Configuration From (including) Up to (excluding)
X.Org X_Server
cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
21.1.11
X.Org Xwayland
cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:*
23.2.4
Fedoraproject Fedora
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Desktop
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Workstation
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Debian Debian_Linux
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

References 24

https://access.redhat.com/errata/RHSA-2024:0320
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0557
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0558
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0597
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0607
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0614
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0617
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0621
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0626
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:0629
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2169
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2170
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2995
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2024:2996
secalert@redhat.com
https://access.redhat.com/errata/RHSA-2025:12751
secalert@redhat.com
https://access.redhat.com/security/cve/CVE-2023-6816
secalert@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2257691
secalert@redhat.com
http://www.openwall.com/lists/oss-security/2024/01/18/1
af854a3a-2127-422b-91ae-364da2661108
https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproj…
af854a3a-2127-422b-91ae-364da2661108
https://security.gentoo.org/glsa/202401-30
af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20240307-0006/
af854a3a-2127-422b-91ae-364da2661108