CVE-2021-4011

A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/
https://lists.x.org/archives/xorg-announce/2021-December/003122.html Vendor Advisory
https://lists.x.org/archives/xorg-announce/2021-December/003124.html Vendor Advisory
https://security.gentoo.org/glsa/202305-30
https://security.netapp.com/advisory/ntap-20220114-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-5027 Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-1550/ Third Party Advisory VDB Entry
https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/
https://lists.x.org/archives/xorg-announce/2021-December/003122.html Vendor Advisory
https://lists.x.org/archives/xorg-announce/2021-December/003124.html Vendor Advisory
https://security.gentoo.org/glsa/202305-30
https://security.netapp.com/advisory/ntap-20220114-0004/ Third Party Advisory
https://www.debian.org/security/2021/dsa-5027 Third Party Advisory
https://www.zerodayinitiative.com/advisories/ZDI-21-1550/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:*
cpe:2.3:a:x.org:x_server:21.1.0:*:*:*:*:*:*:*
cpe:2.3:a:x.org:x_server:21.1.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-12-17 17:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-4011

Mitre link : CVE-2021-4011

CVE.ORG link : CVE-2021-4011


JSON object : View

Products Affected

debian

  • debian_linux

x.org

  • x_server

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer