First published: Tue Jan 02 2024(Updated: )
A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/xorg-server | <21.1.11 | 21.1.11 |
redhat/xwayland | <23.2.4 | 23.2.4 |
debian/xorg-server | 2:1.20.11-1+deb11u13 2:1.20.11-1+deb11u15 2:21.1.7-3+deb12u9 2:21.1.16-1 | |
debian/xwayland | <=2:22.1.9-1 | 2:24.1.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21885 is classified as a high severity vulnerability due to the potential for a heap buffer overflow.
To remediate CVE-2024-21885, update the X.Org server to version 21.1.11 or the Xwayland to version 23.2.4, or apply the specified patches from your Linux distribution.
CVE-2024-21885 can lead to application crashes or arbitrary code execution due to a heap buffer overflow caused by adding certain new device IDs.
CVE-2024-21885 affects specific versions of the X.Org server and Xwayland, particularly those before the fixed versions of 21.1.11 and 23.2.4 respectively.
As of now, there are no publicly available exploits specifically targeting CVE-2024-21885, but the vulnerability itself poses significant risk.