X.org: heap-based buffer overflow (CVE-2024-9632) #shorts #breaking
CVE
This CVE highlights a critical vulnerability in the X.org server, specifically a heap-based buffer overflow. This issue, identified as a zero-day, is caused by incorrect tracking of allocation size in a function called _XkbSetCompatMap. If exploited, a local attacker could use a crafted payload to disrupt the service or escalate privileges, especially in systems where the X.org server operates with root access. Despite the recent discovery of this flaw, no specific attacker or tools have been identified.
Watch the full video on YouTube: CVE-2024-9632
Remediation and exploitation details
This chain involves the following actors
This following systems are involved
Attack entry point
Remediation actions
Exploitation actions
Related Content
NOTE: The following related content has not been vetted and may be unsafe.
- https://access.redhat.com/errata/RHSA-2024:10090
- https://access.redhat.com/errata/RHSA-2024:8798
- https://access.redhat.com/errata/RHSA-2024:9540
- https://access.redhat.com/errata/RHSA-2024:9579
- https://access.redhat.com/errata/RHSA-2024:9601
- https://access.redhat.com/errata/RHSA-2024:9690
- https://access.redhat.com/errata/RHSA-2024:9816
- https://access.redhat.com/errata/RHSA-2024:9818
- https://access.redhat.com/errata/RHSA-2024:9819
- https://access.redhat.com/errata/RHSA-2024:9820
- https://access.redhat.com/errata/RHSA-2024:9901
- https://access.redhat.com/security/cve/CVE-2024-9632
- https://bugzilla.redhat.com/show_bug.cgi?id=2317233