Описание
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Отчет
Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | tigervnc | Out of support scope | ||
Red Hat Enterprise Linux 6 | xorg-x11-server | Out of support scope | ||
Red Hat Enterprise Linux 7 | xorg-x11-server | Fixed | RHSA-2024:1785 | 11.04.2024 |
Red Hat Enterprise Linux 7 | tigervnc | Fixed | RHSA-2024:2080 | 29.04.2024 |
Red Hat Enterprise Linux 8 | tigervnc | Fixed | RHSA-2024:2037 | 24.04.2024 |
Red Hat Enterprise Linux 8 | xorg-x11-server | Fixed | RHSA-2024:3258 | 22.05.2024 |
Red Hat Enterprise Linux 8 | tigervnc | Fixed | RHSA-2024:3261 | 22.05.2024 |
Red Hat Enterprise Linux 8 | xorg-x11-server-Xwayland | Fixed | RHSA-2024:3343 | 23.05.2024 |
Red Hat Enterprise Linux 8.2 Advanced Update Support | tigervnc | Fixed | RHSA-2024:2041 | 24.04.2024 |
Red Hat Enterprise Linux 8.2 Telecommunications Update Service | tigervnc | Fixed | RHSA-2024:2041 | 24.04.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.3 High
CVSS3
Связанные уязвимости
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
A heap-based buffer over-read vulnerability was found in the X.org ser ...
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
EPSS
7.3 High
CVSS3