CVE-2024-9632: Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability

Description

A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.

Classification

CVE ID: CVE-2024-9632

Affected Products

Vendor: Red Hat

Product: Red Hat Enterprise Linux 7 Extended Lifecycle Support

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 12.41% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://access.redhat.com/errata/RHSA-2024:10090
https://access.redhat.com/errata/RHSA-2024:8798
https://access.redhat.com/errata/RHSA-2024:9540
https://access.redhat.com/errata/RHSA-2024:9579
https://access.redhat.com/errata/RHSA-2024:9601
https://access.redhat.com/errata/RHSA-2024:9690
https://access.redhat.com/errata/RHSA-2024:9816
https://access.redhat.com/errata/RHSA-2024:9818
https://access.redhat.com/errata/RHSA-2024:9819
https://access.redhat.com/errata/RHSA-2024:9820
https://access.redhat.com/errata/RHSA-2024:9901
https://access.redhat.com/security/cve/CVE-2024-9632
https://bugzilla.redhat.com/show_bug.cgi?id=2317233

Timeline