Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:1262-1

Опубликовано: 12 апр. 2024
Источник: suse-cvrf

Описание

Security update for xorg-x11-server

This update for xorg-x11-server fixes the following issues:

  • CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
  • CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
  • CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).
  • CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).

Other fixes:

  • Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)

Список пакетов

Image SLES15-SP5-SAPCAL-Azure
xorg-x11-server-21.1.4-150500.7.26.1
xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2
xorg-x11-server-21.1.4-150500.7.26.1
xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-GCE
xorg-x11-server-21.1.4-150500.7.26.1
xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
SUSE Linux Enterprise Module for Basesystem 15 SP5
xorg-x11-server-21.1.4-150500.7.26.1
xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
xorg-x11-server-extra-21.1.4-150500.7.26.1
SUSE Linux Enterprise Module for Development Tools 15 SP5
xorg-x11-server-sdk-21.1.4-150500.7.26.1
openSUSE Leap 15.5
xorg-x11-server-21.1.4-150500.7.26.1
xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
xorg-x11-server-extra-21.1.4-150500.7.26.1
xorg-x11-server-sdk-21.1.4-150500.7.26.1
xorg-x11-server-source-21.1.4-150500.7.26.1

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1

Ссылки

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1

Ссылки

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1

Ссылки

Описание

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.


Затронутые продукты
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-Azure:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-21.1.4-150500.7.26.1
Image SLES15-SP5-SAPCAL-EC2:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1

Ссылки
Уязвимость SUSE-SU-2024:1262-1