vulnerability
CentOS Linux: CVE-2024-31083: Important: X.Org server security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 04/05/2024 | 04/12/2024 | 02/18/2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
04/05/2024
Added
04/12/2024
Modified
02/18/2025
Description
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
Solution(s)
centos-upgrade-tigervnccentos-upgrade-tigervnc-debuginfocentos-upgrade-tigervnc-iconscentos-upgrade-tigervnc-licensecentos-upgrade-tigervnc-servercentos-upgrade-tigervnc-server-appletcentos-upgrade-tigervnc-server-minimalcentos-upgrade-tigervnc-server-modulecentos-upgrade-xorg-x11-server-commoncentos-upgrade-xorg-x11-server-debuginfocentos-upgrade-xorg-x11-server-develcentos-upgrade-xorg-x11-server-sourcecentos-upgrade-xorg-x11-server-xdmxcentos-upgrade-xorg-x11-server-xephyrcentos-upgrade-xorg-x11-server-xnestcentos-upgrade-xorg-x11-server-xorgcentos-upgrade-xorg-x11-server-xvfbcentos-upgrade-xorg-x11-server-xwayland
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.