Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:1260-1

Опубликовано: 12 апр. 2024
Источник: suse-cvrf

Описание

Security update for xorg-x11-server

This update for xorg-x11-server fixes the following issues:

  • CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
  • CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
  • CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).
  • CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).

Other fixes:

  • Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)

Список пакетов

Image SLES15-SP4-SAP
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-Azure
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-EC2
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-GCE
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAPCAL
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAPCAL-Azure
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAPCAL-EC2
xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAPCAL-GCE
xorg-x11-server-1.20.3-150400.38.48.1
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1
xorg-x11-server-sdk-1.20.3-150400.38.48.1
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1
xorg-x11-server-sdk-1.20.3-150400.38.48.1
SUSE Linux Enterprise Server 15 SP4-LTSS
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1
xorg-x11-server-sdk-1.20.3-150400.38.48.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1
xorg-x11-server-sdk-1.20.3-150400.38.48.1
SUSE Manager Proxy 4.3
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1
SUSE Manager Server 4.3
xorg-x11-server-1.20.3-150400.38.48.1
xorg-x11-server-extra-1.20.3-150400.38.48.1

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP4-SAP-Azure:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-EC2:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-GCE:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP:xorg-x11-server-1.20.3-150400.38.48.1

Ссылки

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP4-SAP-Azure:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-EC2:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-GCE:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP:xorg-x11-server-1.20.3-150400.38.48.1

Ссылки

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP4-SAP-Azure:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-EC2:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-GCE:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP:xorg-x11-server-1.20.3-150400.38.48.1

Ссылки

Описание

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.


Затронутые продукты
Image SLES15-SP4-SAP-Azure:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-EC2:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP-GCE:xorg-x11-server-1.20.3-150400.38.48.1
Image SLES15-SP4-SAP:xorg-x11-server-1.20.3-150400.38.48.1

Ссылки
Уязвимость SUSE-SU-2024:1260-1