Описание
Security update for xwayland
This update for xwayland fixes the following issues:
- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).
Other fixes:
- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)
Список пакетов
SUSE Linux Enterprise Workstation Extension 15 SP5
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:1264-1
- E-Mail link for SUSE-SU-2024:1264-1
- SUSE Security Ratings
- SUSE Bug 1222309
- SUSE Bug 1222310
- SUSE Bug 1222312
- SUSE Bug 1222442
- SUSE CVE CVE-2024-31080 page
- SUSE CVE CVE-2024-31081 page
- SUSE CVE CVE-2024-31083 page
Описание
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Затронутые продукты
Ссылки
- CVE-2024-31080
- SUSE Bug 1222309
- SUSE Bug 1222312
Описание
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Затронутые продукты
Ссылки
- CVE-2024-31081
- SUSE Bug 1222310
- SUSE Bug 1222312
Описание
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
Затронутые продукты
Ссылки
- CVE-2024-31083
- SUSE Bug 1222312