vulnerability
Alma Linux: CVE-2024-31083: Important: tigervnc security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Apr 5, 2024 | Apr 30, 2024 | Nov 13, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Apr 5, 2024
Added
Apr 30, 2024
Modified
Nov 13, 2025
Description
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
Solutions
alma-upgrade-tigervncalma-upgrade-tigervnc-iconsalma-upgrade-tigervnc-licensealma-upgrade-tigervnc-selinuxalma-upgrade-tigervnc-serveralma-upgrade-tigervnc-server-minimalalma-upgrade-tigervnc-server-modulealma-upgrade-xorg-x11-server-commonalma-upgrade-xorg-x11-server-develalma-upgrade-xorg-x11-server-sourcealma-upgrade-xorg-x11-server-xdmxalma-upgrade-xorg-x11-server-xephyralma-upgrade-xorg-x11-server-xnestalma-upgrade-xorg-x11-server-xorgalma-upgrade-xorg-x11-server-xvfbalma-upgrade-xorg-x11-server-xwaylandalma-upgrade-xorg-x11-server-xwayland-devel
References
- CVE-2024-31083
- https://attackerkb.com/topics/CVE-2024-31083
- CWE-416
- URL-https://errata.almalinux.org/8/ALSA-2024-2037.html
- URL-https://errata.almalinux.org/8/ALSA-2024-3258.html
- URL-https://errata.almalinux.org/8/ALSA-2024-3261.html
- URL-https://errata.almalinux.org/8/ALSA-2024-3343.html
- URL-https://errata.almalinux.org/9/ALSA-2024-2616.html
- URL-https://errata.almalinux.org/9/ALSA-2024-9093.html
- URL-https://errata.almalinux.org/9/ALSA-2024-9122.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.