vulnerability
Amazon Linux 2023: CVE-2024-0408: Important priority package update for xorg-x11-server
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jan 16, 2024 | Feb 17, 2025 | Jul 9, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 16, 2024
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
Solutions
amazon-linux-2023-upgrade-xorg-x11-server-commonamazon-linux-2023-upgrade-xorg-x11-server-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-debugsourceamazon-linux-2023-upgrade-xorg-x11-server-develamazon-linux-2023-upgrade-xorg-x11-server-sourceamazon-linux-2023-upgrade-xorg-x11-server-xdmxamazon-linux-2023-upgrade-xorg-x11-server-xdmx-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xephyramazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xnestamazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xorgamazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfoamazon-linux-2023-upgrade-xorg-x11-server-xvfbamazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfo
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.