vulnerability
Rocky Linux: CVE-2024-31083: xorg-x11-server (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 04/05/2024 | 05/08/2024 | 03/18/2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
04/05/2024
Added
05/08/2024
Modified
03/18/2025
Description
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
Solution(s)
rocky-upgrade-tigervncrocky-upgrade-tigervnc-debuginforocky-upgrade-tigervnc-debugsourcerocky-upgrade-tigervnc-serverrocky-upgrade-tigervnc-server-debuginforocky-upgrade-tigervnc-server-minimalrocky-upgrade-tigervnc-server-minimal-debuginforocky-upgrade-tigervnc-server-modulerocky-upgrade-tigervnc-server-module-debuginforocky-upgrade-xorg-x11-server-commonrocky-upgrade-xorg-x11-server-debuginforocky-upgrade-xorg-x11-server-debugsourcerocky-upgrade-xorg-x11-server-develrocky-upgrade-xorg-x11-server-xdmxrocky-upgrade-xorg-x11-server-xdmx-debuginforocky-upgrade-xorg-x11-server-xephyrrocky-upgrade-xorg-x11-server-xephyr-debuginforocky-upgrade-xorg-x11-server-xnestrocky-upgrade-xorg-x11-server-xnest-debuginforocky-upgrade-xorg-x11-server-xorgrocky-upgrade-xorg-x11-server-xorg-debuginforocky-upgrade-xorg-x11-server-xvfbrocky-upgrade-xorg-x11-server-xvfb-debuginforocky-upgrade-xorg-x11-server-xwaylandrocky-upgrade-xorg-x11-server-xwayland-debuginforocky-upgrade-xorg-x11-server-xwayland-debugsourcerocky-upgrade-xorg-x11-server-xwayland-devel
References
- CVE-2024-31083
- https://attackerkb.com/topics/CVE-2024-31083
- URL-https://errata.rockylinux.org/RLSA-2024:2037
- URL-https://errata.rockylinux.org/RLSA-2024:2616
- URL-https://errata.rockylinux.org/RLSA-2024:3258
- URL-https://errata.rockylinux.org/RLSA-2024:3261
- URL-https://errata.rockylinux.org/RLSA-2024:3343
- URL-https://errata.rockylinux.org/RLSA-2024:9093
- URL-https://errata.rockylinux.org/RLSA-2024:9122

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.