An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
18 Oct 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
X.org
Redhat Redhat enterprise Linux Aus Redhat enterprise Linux Update Services For Sap Solutions Redhat enterprise Linux Redhat enterprise Linux Tus X.org xwayland X.org x Server Redhat enterprise Linux Eus Fedoraproject fedora Fedoraproject |
|
CPE | cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:* |
|
References | () https://access.redhat.com/errata/RHSA-2024:0320 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0557 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0558 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0597 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0607 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0614 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0617 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0621 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0626 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0629 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2169 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2170 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2995 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2996 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-0229 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2256690 - Issue Tracking, Third Party Advisory |
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 14:31
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Feb 2024, 07:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-09 07:16
Updated : 2024-10-18 13:49
NVD link : CVE-2024-0229
Mitre link : CVE-2024-0229
CVE.ORG link : CVE-2024-0229
JSON object : View
Products Affected
fedoraproject
- fedora
x.org
- x_server
- xwayland
redhat
- enterprise_linux_tus
- enterprise_linux_eus
- enterprise_linux_update_services_for_sap_solutions
- enterprise_linux_aus
- enterprise_linux