First published: Tue Oct 08 2024(Updated: )
The _XkbSetCompatMap() function attempts to resize the `sym_interpret` buffer. However, it didn't update its size properly. It updated `num_si` only, without `size_si`: <a href="https://gitlab.freedesktop.org/xorg/xserver/-/blob/cdb4d5648a818a8e8ab282341be37109589229ab/xkb/xkb.c#L2998">https://gitlab.freedesktop.org/xorg/xserver/-/blob/cdb4d5648a818a8e8ab282341be37109589229ab/xkb/xkb.c#L2998</a> The exploit uses bitmap to achieve the arbitrary read and write. It leads to LPE for some distributions (xorg in debian xfce is run as root under specific display driver) and RCE for ssh x11 forwarding environment. The exploit doesn't work if the OS installed on vmware and default virtualbox. It works on virtualbox with VBoxVGA graphic controller.
Affected Software | Affected Version | How to fix |
---|---|---|
X.org X.org |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2317233 is classified as medium due to potential memory corruption risks.
To fix REDHAT-BUG-2317233, apply the latest software updates provided by your Linux distribution vendor.
REDHAT-BUG-2317233 affects the X.Org X Server software.
The potential consequences of REDHAT-BUG-2317233 include memory corruption, which may lead to crashes or arbitrary code execution.
There is no documented workaround for REDHAT-BUG-2317233, so applying updates is crucial.