MGASA-2024-0357

Source
https://advisories.mageia.org/MGASA-2024-0357.html
Import Source
https://advisories.mageia.org/MGASA-2024-0357.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0357
Related
Published
2024-11-12T19:53:59Z
Modified
2024-11-11T19:42:46Z
Summary
Updated x11-server, x11-server-xwayland & tigervnc packages fix security vulnerability
Details

Due to an improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially-crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges. (CVE-2024-9632)

References
Credits

Affected packages

Mageia:9 / x11-server

Package

Name
x11-server
Purl
pkg:rpm/mageia/x11-server?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21.1.8-7.6.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / x11-server-xwayland

Package

Name
x11-server-xwayland
Purl
pkg:rpm/mageia/x11-server-xwayland?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
22.1.9-1.6.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / tigervnc

Package

Name
tigervnc
Purl
pkg:rpm/mageia/tigervnc?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13.1-2.6.mga9

Ecosystem specific

{
    "section": "core"
}