An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
18 Oct 2024, 13:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:* cpe:2.3:a:x.org:x_server:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:x.org:xwayland:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:* |
|
First Time |
Redhat
Fedoraproject Redhat enterprise Linux Tus Redhat enterprise Linux Aus X.org Redhat enterprise Linux Update Services For Sap Solutions X.org x Server X.org xwayland Redhat enterprise Linux Fedoraproject fedora Redhat enterprise Linux Eus |
|
CWE | CWE-787 | |
References | () https://access.redhat.com/errata/RHSA-2024:0320 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0557 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0558 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0597 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0607 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0614 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0617 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0621 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0626 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:0629 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2169 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2170 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2995 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:2996 - Third Party Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2024-0229 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2256690 - Issue Tracking, Third Party Advisory |
22 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Apr 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 07:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-09 07:16
Updated : 2024-10-18 13:49
NVD link : CVE-2024-0229
Mitre link : CVE-2024-0229
CVE.ORG link : CVE-2024-0229
JSON object : View
Products Affected
x.org
- x_server
- xwayland
redhat
- enterprise_linux
- enterprise_linux_tus
- enterprise_linux_update_services_for_sap_solutions
- enterprise_linux_aus
- enterprise_linux_eus
fedoraproject
- fedora