CVE-2024-31080

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31080
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31080.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-31080
Related
Published
2024-04-04T14:15:10Z
Modified
2024-11-12T15:49:44.963918Z
Summary
[none]
Details

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.

References

Affected packages

Debian:11 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:1.20.11-1+deb11u13

Affected versions

2:1.*

2:1.20.11-1
2:1.20.11-1+deb11u1
2:1.20.11-1+deb11u2
2:1.20.11-1+deb11u3
2:1.20.11-1+deb11u4
2:1.20.11-1+deb11u5
2:1.20.11-1+deb11u6
2:1.20.11-1+deb11u7
2:1.20.11-1+deb11u8
2:1.20.11-1+deb11u9
2:1.20.11-1+deb11u10
2:1.20.11-1+deb11u11
2:1.20.11-1+deb11u12

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.7-3+deb12u7

Affected versions

2:21.*

2:21.1.7-3
2:21.1.7-3+deb12u1
2:21.1.7-3+deb12u2
2:21.1.7-3+deb12u3
2:21.1.7-3+deb12u4
2:21.1.7-3+deb12u5
2:21.1.7-3+deb12u6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xorg-server

Package

Name
xorg-server
Purl
pkg:deb/debian/xorg-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:21.1.11-3

Affected versions

2:21.*

2:21.1.7-3
2:21.1.8-1
2:21.1.9-1
2:21.1.9-1+hurd.1
2:21.1.10-1
2:21.1.11-1
2:21.1.11-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xwayland

Package

Name
xwayland
Purl
pkg:deb/debian/xwayland?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:22.*

2:22.1.9-1

2:23.*

2:23.1.0-1
2:23.1.1-1
2:23.2.0-1
2:23.2.1-1
2:23.2.2-1
2:23.2.3-1
2:23.2.4-1
2:23.2.6-1

2:24.*

2:24.0.99.901-1
2:24.1.0-1
2:24.1.2-1
2:24.1.3-1
2:24.1.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xwayland

Package

Name
xwayland
Purl
pkg:deb/debian/xwayland?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:23.2.6-1

Affected versions

2:22.*

2:22.1.9-1

2:23.*

2:23.1.0-1
2:23.1.1-1
2:23.2.0-1
2:23.2.1-1
2:23.2.2-1
2:23.2.3-1
2:23.2.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}