We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9632

Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability



Description

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.

Reserved 2024-10-08 | Published 2024-10-30 | Updated 2024-12-26 | Assigner redhat


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Heap-based Buffer Overflow

Product status

Default status
unaffected

1.1.1 before 21.1.14
affected

Default status
affected

0:1.8.0-34.el7_9 before *
unaffected

Default status
affected

0:1.20.11-25.el8_10 before *
unaffected

Default status
affected

0:21.1.3-17.el8_10 before *
unaffected

Default status
affected

0:1.13.1-14.el8_10 before *
unaffected

Default status
affected

0:1.9.0-15.el8_2.12 before *
unaffected

Default status
affected

0:1.11.0-8.el8_4.11 before *
unaffected

Default status
affected

0:1.11.0-8.el8_4.11 before *
unaffected

Default status
affected

0:1.11.0-8.el8_4.11 before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.12 before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.12 before *
unaffected

Default status
affected

0:1.12.0-6.el8_6.12 before *
unaffected

Default status
affected

0:1.12.0-15.el8_8.11 before *
unaffected

Default status
affected

0:1.14.1-1.el9_5 before *
unaffected

Default status
affected

0:1.11.0-22.el9_0.12 before *
unaffected

Default status
affected

0:1.12.0-14.el9_2.9 before *
unaffected

Default status
affected

0:1.13.1-8.el9_4.4 before *
unaffected

Default status
affected

Default status
unknown

Default status
unknown

Default status
affected

Default status
affected

Timeline

2024-10-08:Reported to Red Hat.
2024-10-29:Made public.

References

access.redhat.com/errata/RHSA-2024:10090 (RHSA-2024:10090) vendor-advisory

access.redhat.com/errata/RHSA-2024:8798 (RHSA-2024:8798) vendor-advisory

access.redhat.com/errata/RHSA-2024:9540 (RHSA-2024:9540) vendor-advisory

access.redhat.com/errata/RHSA-2024:9579 (RHSA-2024:9579) vendor-advisory

access.redhat.com/errata/RHSA-2024:9601 (RHSA-2024:9601) vendor-advisory

access.redhat.com/errata/RHSA-2024:9690 (RHSA-2024:9690) vendor-advisory

access.redhat.com/errata/RHSA-2024:9816 (RHSA-2024:9816) vendor-advisory

access.redhat.com/errata/RHSA-2024:9818 (RHSA-2024:9818) vendor-advisory

access.redhat.com/errata/RHSA-2024:9819 (RHSA-2024:9819) vendor-advisory

access.redhat.com/errata/RHSA-2024:9820 (RHSA-2024:9820) vendor-advisory

access.redhat.com/errata/RHSA-2024:9901 (RHSA-2024:9901) vendor-advisory

access.redhat.com/security/cve/CVE-2024-9632 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2317233 (RHBZ#2317233) issue-tracking

cve.org (CVE-2024-9632)

nvd.nist.gov (CVE-2024-9632)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-9632

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.