Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:1264-1

Опубликовано: 12 апр. 2024
Источник: suse-cvrf

Описание

Security update for xwayland

This update for xwayland fixes the following issues:

  • CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
  • CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
  • CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).

Other fixes:

  • Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)

Список пакетов

SUSE Linux Enterprise Workstation Extension 15 SP5
xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5
xwayland-22.1.5-150500.7.22.1
xwayland-devel-22.1.5-150500.7.22.1

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1

Ссылки

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.


Затронутые продукты
SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1

Ссылки

Описание

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.


Затронутые продукты
SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1
openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1

Ссылки