跳转到帖子

Gentoo Linux: CVE-2024-31082: X.Org X server, XWayland: Multiple Vulnerabilities

recommended_posts

发布于
  • Members

Gentoo Linux: CVE-2024-31082: X.Org X server, XWayland: Multiple Vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/04/2024
Created
11/19/2024
Added
11/18/2024
Modified
11/18/2024

Description

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

Solution(s)

  • gentoo-linux-upgrade-x11-base-xorg-server
  • gentoo-linux-upgrade-x11-base-xwayland

References

  • https://attackerkb.com/topics/cve-2024-31082
  • CVE - 2024-31082
  • 202411-08
  • 查看数 706
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…