NewStart CGSL MAIN 7.02 : xorg-x11-server Multiple Vulnerabilities (NS-SA-2025-0194)

high Nessus Plugin ID 242770

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 7.02, has xorg-x11-server packages installed that are affected by multiple vulnerabilities:

- A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context. (CVE-2024-0409)

- A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation.
If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
(CVE-2023-1393)

- A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service. (CVE-2023-5367)

- A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. (CVE-2023-5380)

- A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
(CVE-2024-0408)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL xorg-x11-server packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2025-0194

https://security.gd-linux.com/info/CVE-2023-1393

https://security.gd-linux.com/info/CVE-2023-5367

https://security.gd-linux.com/info/CVE-2023-5380

https://security.gd-linux.com/info/CVE-2024-0408

https://security.gd-linux.com/info/CVE-2024-0409

https://security.gd-linux.com/info/CVE-2024-31080

https://security.gd-linux.com/info/CVE-2024-31081

https://security.gd-linux.com/info/CVE-2024-31082

https://security.gd-linux.com/info/CVE-2024-31083

Plugin Details

Severity: High

ID: 242770

File Name: newstart_cgsl_NS-SA-2025-0194_xorg-x11-server.nasl

Version: 1.1

Type: local

Published: 7/25/2025

Updated: 7/25/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-0409

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:xorg-x11-server-common, cpe:/o:zte:cgsl_main:7, p-cpe:/a:zte:cgsl_main:xorg-x11-server-xorg

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/25/2025

Vulnerability Publication Date: 3/29/2023

Reference Information

CVE: CVE-2023-1393, CVE-2023-5367, CVE-2023-5380, CVE-2024-0408, CVE-2024-0409, CVE-2024-31080, CVE-2024-31081, CVE-2024-31082, CVE-2024-31083