Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-31080

Опубликовано: 04 апр. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.3

Описание

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
mantic

not-affected

code not present
noble

not-affected

code not present
oracular

not-affected

code not present
plucky

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
devel

released

2:21.1.12-1ubuntu1
esm-infra-legacy/trusty

not-affected

2:1.15.1-0ubuntu2.11+esm11
esm-infra/bionic

released

2:1.19.6-1ubuntu4.15+esm7
esm-infra/focal

not-affected

2:1.20.13-1ubuntu1~20.04.16
esm-infra/xenial

released

2:1.18.4-0ubuntu0.12+esm12
focal

released

2:1.20.13-1ubuntu1~20.04.16
jammy

released

2:21.1.4-2ubuntu1.7~22.04.9
mantic

released

2:21.1.7-3ubuntu2.8
noble

released

2:21.1.12-1ubuntu1
oracular

released

2:21.1.12-1ubuntu1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

esm-infra/xenial

needs-triage

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

2:23.2.6-1
esm-infra/focal

DNE

focal

DNE

jammy

released

2:22.1.1-1ubuntu0.12
mantic

released

2:23.2.0-1ubuntu0.5
noble

not-affected

2:23.2.6-1
oracular

not-affected

2:23.2.6-1
plucky

not-affected

2:23.2.6-1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 29%
0.00102
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
nvd
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVSS3: 7.3
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.3
debian
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org ser ...

CVSS3: 7.3
github
около 1 года назад

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

EPSS

Процентиль: 29%
0.00102
Низкий

7.3 High

CVSS3