We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9632

Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability



Assignerredhat
Reserved2024-10-08
Published2024-10-30
Updated2024-11-04

Description

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.



HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
affected

0:1.20.11-25.el8_10 before *
unaffected

Default status
affected

0:21.1.3-17.el8_10 before *
unaffected

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2024-10-08:Reported to Red Hat.
2024-10-29:Made public.

References

https://access.redhat.com/errata/RHSA-2024:8798 (RHSA-2024:8798) vendor-advisory

https://access.redhat.com/security/cve/CVE-2024-9632 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2317233 (RHBZ#2317233) issue-tracking

cve.org CVE-2024-9632

nvd.nist.gov CVE-2024-9632

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.