A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Workstation Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
X Server Subscribe
Xwayland Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3721-1 xorg-server security update
Debian DSA Debian DSA DSA-5603-1 xorg-server security update
EUVD EUVD EUVD-2023-59026 A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
Ubuntu USN Ubuntu USN USN-6587-1 X.Org X Server vulnerabilities
Ubuntu USN Ubuntu USN USN-6587-2 X.Org X Server vulnerabilities
Ubuntu USN Ubuntu USN USN-6587-5 X.Org X Server vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

References
Link Providers
http://www.openwall.com/lists/oss-security/2024/01/18/1 cve-icon
https://access.redhat.com/errata/RHSA-2024:0320 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0557 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0558 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0597 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0607 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0614 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0617 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0621 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0626 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:0629 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2169 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2170 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2995 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2996 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:12751 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2023-6816 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2257691 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/ cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/ cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/ cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2023-6816 cve-icon
https://security.gentoo.org/glsa/202401-30 cve-icon
https://security.netapp.com/advisory/ntap-20240307-0006/ cve-icon
https://www.cve.org/CVERecord?id=CVE-2023-6816 cve-icon
History

Thu, 19 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:8::crb
References

Fri, 29 Aug 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared X.org x Server
CPEs cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
Vendors & Products X.org xorg-server
X.org x Server

Mon, 04 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:6
Vendors & Products Redhat rhel Els
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.02434}

epss

{'score': 0.02101}


Tue, 17 Jun 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 12:00:00 +0000


Mon, 16 Sep 2024 16:30:00 +0000


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-19T21:23:24.417Z

Reserved: 2023-12-14T04:34:38.017Z

Link: CVE-2023-6816

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:07.410Z

cve-icon NVD

Status : Modified

Published: 2024-01-18T05:15:08.607

Modified: 2026-03-19T22:16:15.037

Link: CVE-2023-6816

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-16T00:00:00Z

Links: CVE-2023-6816 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses