MGASA-2024-0357

Source
https://advisories.mageia.org/MGASA-2024-0357.html
Import Source
https://advisories.mageia.org/MGASA-2024-0357.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0357
Related
Published
2024-11-12T19:53:59Z
Modified
2024-11-11T19:42:46Z
Summary
Updated x11-server, x11-server-xwayland & tigervnc packages fix security vulnerability
Details

Due to an improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially-crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges. (CVE-2024-9632)

References
Credits

Affected packages