Количество 28
Количество 28

BDU:2024-03132
Уязвимость функции ProcXIGetSelectedEvents() сервера X Window System Xorg-server, позволяющая нарушитель получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

ROS-20240507-07
Множественные уязвимости xorg-x11-server-common

CVE-2024-31080
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVE-2024-31080
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVE-2024-31080
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

CVE-2024-31080
CVE-2024-31080
A heap-based buffer over-read vulnerability was found in the X.org ser ...
GHSA-mqqf-4p7r-rf89
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

SUSE-SU-2024:2776-1
Security update for dri3proto, presentproto, wayland-protocols, xwayland

SUSE-SU-2024:1264-1
Security update for xwayland

RLSA-2024:3343
Important: xorg-x11-server-Xwayland security update

RLSA-2024:3261
Important: tigervnc security update

RLSA-2024:3258
Moderate: xorg-x11-server security update

RLSA-2024:2616
Important: tigervnc security update

RLSA-2024:2037
Important: tigervnc security update
ELSA-2024-9122
ELSA-2024-9122: xorg-x11-server security update (MODERATE)
ELSA-2024-9093
ELSA-2024-9093: xorg-x11-server-Xwayland security update (MODERATE)
ELSA-2024-3343
ELSA-2024-3343: xorg-x11-server-Xwayland security update (IMPORTANT)
ELSA-2024-3261
ELSA-2024-3261: tigervnc security update (IMPORTANT)
ELSA-2024-3258
ELSA-2024-3258: xorg-x11-server security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-03132 Уязвимость функции ProcXIGetSelectedEvents() сервера X Window System Xorg-server, позволяющая нарушитель получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | ROS-20240507-07 Множественные уязвимости xorg-x11-server-common | CVSS3: 7.8 | около 1 года назад | |
![]() | CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 7.3 | 0% Низкий | 9 месяцев назад | |
CVE-2024-31080 A heap-based buffer over-read vulnerability was found in the X.org ser ... | CVSS3: 7.3 | 0% Низкий | около 1 года назад | |
GHSA-mqqf-4p7r-rf89 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | CVSS3: 7.3 | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2024:2776-1 Security update for dri3proto, presentproto, wayland-protocols, xwayland | 11 месяцев назад | ||
![]() | SUSE-SU-2024:1264-1 Security update for xwayland | около 1 года назад | ||
![]() | RLSA-2024:3343 Important: xorg-x11-server-Xwayland security update | около 1 года назад | ||
![]() | RLSA-2024:3261 Important: tigervnc security update | около 1 года назад | ||
![]() | RLSA-2024:3258 Moderate: xorg-x11-server security update | около 1 года назад | ||
![]() | RLSA-2024:2616 Important: tigervnc security update | около 1 года назад | ||
![]() | RLSA-2024:2037 Important: tigervnc security update | около 1 года назад | ||
ELSA-2024-9122 ELSA-2024-9122: xorg-x11-server security update (MODERATE) | 7 месяцев назад | |||
ELSA-2024-9093 ELSA-2024-9093: xorg-x11-server-Xwayland security update (MODERATE) | 7 месяцев назад | |||
ELSA-2024-3343 ELSA-2024-3343: xorg-x11-server-Xwayland security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-3261 ELSA-2024-3261: tigervnc security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-3258 ELSA-2024-3258: xorg-x11-server security update (MODERATE) | около 1 года назад |
Уязвимостей на страницу