ALT-BU-2024-8636-1
Branch p10_e2k update bulletin.
Package cryptsetup updated to version 2.6.1-alt1 for branch p10_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4122
It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
- https://access.redhat.com/security/cve/CVE-2021-4122
- https://access.redhat.com/security/cve/CVE-2021-4122
- https://bugzilla.redhat.com/show_bug.cgi?id=2031859
- https://bugzilla.redhat.com/show_bug.cgi?id=2031859
- https://bugzilla.redhat.com/show_bug.cgi?id=2032401
- https://bugzilla.redhat.com/show_bug.cgi?id=2032401
- https://gitlab.com/cryptsetup/cryptsetup/-/commit/0113ac2d889c5322659ad0596d4cfc6da53e356c
- https://gitlab.com/cryptsetup/cryptsetup/-/commit/0113ac2d889c5322659ad0596d4cfc6da53e356c
- https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes
- https://mirrors.edge.kernel.org/pub/linux/utils/cryptsetup/v2.4/v2.4.3-ReleaseNotes
Package util-linux updated to version 2.39.2-alt0.p10.2 for branch p10_e2k.
Closed vulnerabilities
BDU:2024-02517
Уязвимость пакета util-linux операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к паролям или изменить буфер обмена пользователя
Modified: 2025-03-20
CVE-2024-28085
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
- [oss-security] 20240327 CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240327 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- [oss-security] 20240328 Re: CVE-2024-28085: Escape sequence injection in util-linux wall
- https://github.com/skyler-ferrante/CVE-2024-28085
- https://github.com/skyler-ferrante/CVE-2024-28085
- https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq
- https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq
- [debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update
- [debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/
- https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
- https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
- https://security.netapp.com/advisory/ntap-20240531-0003/
- https://security.netapp.com/advisory/ntap-20240531-0003/
- https://www.openwall.com/lists/oss-security/2024/03/27/5
- https://www.openwall.com/lists/oss-security/2024/03/27/5
Package xorg-server updated to version 1.20.14-alt13.E2K.1 for branch p10_e2k.
Closed vulnerabilities
BDU:2018-01290
Уязвимость программного пакета X.Org Server, вызванная ошибками при обработке и проверке параметров командной строки, позволяющая нарушителю получить привилегии root и перезаписать произвольный файл в операционной системе
BDU:2024-00405
Уязвимость функций DeviceFocusEvent и XIQueryPointer реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-00457
Уязвимость пакета xorg-x11-server, связанная с использованием памяти после её освобождения при обработке объектов Button Action, позволяющая повысить свои привилегии и выполнить произвольный код в контексте root
BDU:2024-00638
Уязвимость компонента GLX PBuffer Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00639
Уязвимость компонента Privates Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю выполнить произвольный код
BDU:2024-00667
Уязвимость функции XISendDeviceHierarchyEvent реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-00675
Уязвимость функции DisableDevice реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-00676
Уязвимость реализации протокола Wayland для X.Org XWayland, реализации сервера X Window System X.Org Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-02764
Уязвимость пакета xorg-server, связанная с целочисленным переполнением или обходом, позволяющая нарушитель раскрыть конфиденциальную информацию
BDU:2024-03104
Уязвимость функции ProcXIPassiveGrabDevice() сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-03109
Уязвимость функции ProcAppleDRICreatePixmap() сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-03130
Уязвимость функции ProcRenderAddGlyphs() сервера X Window System Xorg-server, позволяющая нарушителю выполнить произвольный код
BDU:2024-03132
Уязвимость функции ProcXIGetSelectedEvents() сервера X Window System Xorg-server, позволяющая нарушитель получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14665
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
- http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html
- http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html
- 105741
- 1041948
- RHSA-2018:3410
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665
- https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
- https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170
- [xorg-announce] 20181025 X.Org security advisory: October 25, 2018
- GLSA-201810-09
- USN-3802-1
- DSA-4328
- 45697
- 45742
- 45832
- 45908
- 45922
- 45938
- 46142
- https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
- http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html
- https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
- 46142
- 45938
- 45922
- 45908
- 45832
- 45742
- 45697
- DSA-4328
- USN-3802-1
- GLSA-201810-09
- [xorg-announce] 20181025 X.Org security advisory: October 25, 2018
- https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170
- https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665
- RHSA-2018:3410
- 1041948
- 105741
- http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html
Modified: 2024-11-21
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6377
- https://access.redhat.com/security/cve/CVE-2023-6377
- RHBZ#2253291
- RHBZ#2253291
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6478
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6478
- https://access.redhat.com/security/cve/CVE-2023-6478
- RHBZ#2253298
- RHBZ#2253298
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6816
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
- http://www.openwall.com/lists/oss-security/2024/01/18/1
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6816
- https://access.redhat.com/security/cve/CVE-2023-6816
- RHBZ#2257691
- RHBZ#2257691
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-23
CVE-2024-0229
An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0229
- RHBZ#2256690
- RHSA-2024:0320
- RHBZ#2256690
- https://access.redhat.com/security/cve/CVE-2024-0229
- RHSA-2024:2996
- RHSA-2024:2995
- RHSA-2024:2170
- RHSA-2024:2169
- RHSA-2024:0629
- RHSA-2024:0626
- RHSA-2024:0621
- RHSA-2024:0617
- RHSA-2024:0614
- RHSA-2024:0607
- RHSA-2024:0597
- RHSA-2024:0558
- RHSA-2024:0557
Modified: 2024-11-21
CVE-2024-0408
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0408
- https://access.redhat.com/security/cve/CVE-2024-0408
- RHBZ#2257689
- RHBZ#2257689
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-0409
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0409
- https://access.redhat.com/security/cve/CVE-2024-0409
- RHBZ#2257690
- RHBZ#2257690
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-21885
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-21885
- https://access.redhat.com/security/cve/CVE-2024-21885
- RHBZ#2256540
- RHBZ#2256540
- https://security.netapp.com/advisory/ntap-20240503-0004/
Modified: 2024-11-21
CVE-2024-21886
A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-21886
- https://access.redhat.com/security/cve/CVE-2024-21886
- RHBZ#2256542
- RHBZ#2256542
Modified: 2024-11-21
CVE-2024-31080
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
- http://www.openwall.com/lists/oss-security/2024/04/03/13
- http://www.openwall.com/lists/oss-security/2024/04/12/10
- RHSA-2024:1785
- RHSA-2024:1785
- RHSA-2024:2036
- RHSA-2024:2036
- RHSA-2024:2037
- RHSA-2024:2037
- RHSA-2024:2038
- RHSA-2024:2038
- RHSA-2024:2039
- RHSA-2024:2039
- RHSA-2024:2040
- RHSA-2024:2040
- RHSA-2024:2041
- RHSA-2024:2041
- RHSA-2024:2042
- RHSA-2024:2042
- RHSA-2024:2080
- RHSA-2024:2080
- RHSA-2024:2616
- RHSA-2024:2616
- RHSA-2024:3258
- RHSA-2024:3258
- RHSA-2024:3261
- RHSA-2024:3261
- RHSA-2024:3343
- RHSA-2024:3343
- RHSA-2024:9093
- RHSA-2024:9122
- https://access.redhat.com/security/cve/CVE-2024-31080
- https://access.redhat.com/security/cve/CVE-2024-31080
- RHBZ#2271997
- RHBZ#2271997
- https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/
Modified: 2024-11-21
CVE-2024-31081
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
- http://www.openwall.com/lists/oss-security/2024/04/03/13
- http://www.openwall.com/lists/oss-security/2024/04/12/10
- RHSA-2024:1785
- RHSA-2024:1785
- RHSA-2024:2036
- RHSA-2024:2036
- RHSA-2024:2037
- RHSA-2024:2037
- RHSA-2024:2038
- RHSA-2024:2038
- RHSA-2024:2039
- RHSA-2024:2039
- RHSA-2024:2040
- RHSA-2024:2040
- RHSA-2024:2041
- RHSA-2024:2041
- RHSA-2024:2042
- RHSA-2024:2042
- RHSA-2024:2080
- RHSA-2024:2080
- RHSA-2024:2616
- RHSA-2024:2616
- RHSA-2024:3258
- RHSA-2024:3258
- RHSA-2024:3261
- RHSA-2024:3261
- RHSA-2024:3343
- RHSA-2024:3343
- RHSA-2024:9093
- RHSA-2024:9122
- https://access.redhat.com/security/cve/CVE-2024-31081
- https://access.redhat.com/security/cve/CVE-2024-31081
- RHBZ#2271998
- RHBZ#2271998
- https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/
Modified: 2024-11-21
CVE-2024-31082
A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
- http://www.openwall.com/lists/oss-security/2024/04/03/13
- http://www.openwall.com/lists/oss-security/2024/04/12/10
- https://access.redhat.com/security/cve/CVE-2024-31082
- https://access.redhat.com/security/cve/CVE-2024-31082
- RHBZ#2271999
- RHBZ#2271999
- https://lists.x.org/archives/xorg-announce/2024-April/003497.html
- https://lists.x.org/archives/xorg-announce/2024-April/003497.html
Modified: 2024-11-21
CVE-2024-31083
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
- http://www.openwall.com/lists/oss-security/2024/04/03/13
- http://www.openwall.com/lists/oss-security/2024/04/12/10
- RHSA-2024:1785
- RHSA-2024:1785
- RHSA-2024:2036
- RHSA-2024:2036
- RHSA-2024:2037
- RHSA-2024:2037
- RHSA-2024:2038
- RHSA-2024:2038
- RHSA-2024:2039
- RHSA-2024:2039
- RHSA-2024:2040
- RHSA-2024:2040
- RHSA-2024:2041
- RHSA-2024:2041
- RHSA-2024:2042
- RHSA-2024:2042
- RHSA-2024:2080
- RHSA-2024:2080
- RHSA-2024:2616
- RHSA-2024:2616
- RHSA-2024:3258
- RHSA-2024:3258
- RHSA-2024:3261
- RHSA-2024:3261
- RHSA-2024:3343
- RHSA-2024:3343
- RHSA-2024:9093
- RHSA-2024:9122
- https://access.redhat.com/security/cve/CVE-2024-31083
- https://access.redhat.com/security/cve/CVE-2024-31083
- RHBZ#2272000
- RHBZ#2272000
- https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/
Closed bugs
Падение Xorg после обновления до 1.20.14-alt12