<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2023-0172</id>
    <title>An update for xorg-x11-server is now available for HCE 2.0</title>
    <severity>Critical</severity>
    <release>HCE 2.0</release>
    <issued date="2023-03-27 08:19:43"/>
    <updated date="2023-03-27 08:19:43"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-14345" id="CVE-2020-14345" title="CVE-2020-14345 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-14362" id="CVE-2020-14362" title="CVE-2020-14362 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-14361" id="CVE-2020-14361" title="CVE-2020-14361 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494" id="CVE-2023-0494" title="CVE-2023-0494 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341" id="CVE-2022-46341" title="CVE-2022-46341 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343" id="CVE-2022-46343" title="CVE-2022-46343 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-20839" id="CVE-2018-20839" title="CVE-2018-20839 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3472" id="CVE-2021-3472" title="CVE-2021-3472 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340" id="CVE-2022-46340" title="CVE-2022-46340 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342" id="CVE-2022-46342" title="CVE-2022-46342 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-14346" id="CVE-2020-14346" title="CVE-2020-14346 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344" id="CVE-2022-46344" title="CVE-2022-46344 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283" id="CVE-2022-4283" title="CVE-2022-4283 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14345)

A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14362)

A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14361)

A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. (CVE-2023-0494)

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. (CVE-2022-46341)

A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. (CVE-2022-46343)

systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled. (CVE-2018-20839)

A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3472)

A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order. (CVE-2022-46340)

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se (CVE-2022-46342)

A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14346)

A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. (CVE-2022-46344)

A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. (CVE-2022-4283)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="xorg-x11-server">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="xorg-x11-server" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-common" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-common-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-devel" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-devel-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="xorg-x11-server-help" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-help-1.20.11-4.r8.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="xorg-x11-server-source" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-source-1.20.11-4.r8.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-Xdmx" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xdmx-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-Xephyr" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xephyr-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-Xnest" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xnest-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="xorg-x11-server-Xvfb" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xvfb-1.20.11-4.r8.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-common" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-common-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-devel" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-devel-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-Xdmx" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xdmx-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-Xephyr" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xephyr-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-Xnest" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xnest-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="xorg-x11-server-Xvfb" version="1.20.11" release="4.r8.hce2">
          <filename>xorg-x11-server-Xvfb-1.20.11-4.r8.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
