CVE-2024-9632

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
Configurations

No configuration.

History

13 Nov 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:9601 -

13 Nov 2024, 19:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:9579 -

05 Nov 2024, 00:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:8798 -

01 Nov 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Se encontró un fallo en el servidor X.org. Debido a que el tamaño de asignación no se rastrea correctamente en _XkbSetCompatMap, un atacante local podría desencadenar una condición de desbordamiento de búfer a través de un payload especialmente manipulado, lo que provocaría una denegación de servicio o una escalada de privilegios locales en distribuciones donde el servidor X.org se ejecuta con privilegios de root.

30 Oct 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-30 08:15

Updated : 2024-11-13 20:15


NVD link : CVE-2024-9632

Mitre link : CVE-2024-9632

CVE.ORG link : CVE-2024-9632


JSON object : View

Products Affected

No product.

CWE
CWE-122

Heap-based Buffer Overflow