← Retour aux CVEs
CVE-2024-9632
HIGH7.8
Description
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie10/30/2024
Derniere modification8/4/2025
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-122
References
https://access.redhat.com/errata/RHSA-2024:10090(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:8798(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9540(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9579(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9601(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9690(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9816(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9818(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9819(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9820(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2024:9901(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2025:12751(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2025:7163(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2025:7165(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2025:7458(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-9632(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2317233(secalert@redhat.com)
http://seclists.org/fulldisclosure/2024/Oct/20(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2024/10/29/2(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2024/10/msg00031.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.