跳转到帖子

SUSE: CVE-2024-31083: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2024-31083: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/05/2024
Created
04/11/2024
Added
04/11/2024
Modified
08/07/2024

Description

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.

Solution(s)

  • suse-upgrade-dri3proto-devel
  • suse-upgrade-presentproto-devel
  • suse-upgrade-wayland-protocols-devel
  • suse-upgrade-xorg-x11-server
  • suse-upgrade-xorg-x11-server-extra
  • suse-upgrade-xorg-x11-server-sdk
  • suse-upgrade-xorg-x11-server-source
  • suse-upgrade-xorg-x11-server-wayland
  • suse-upgrade-xorg-x11-server-xvfb
  • suse-upgrade-xwayland
  • suse-upgrade-xwayland-devel

References

  • https://attackerkb.com/topics/cve-2024-31083
  • CVE - 2024-31083
  • 查看数 705
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…