• 公告ID (KylinSec-SA-2024-3147)

摘要:

xorg-x11-server security update

安全等级: High

公告ID: KylinSec-SA-2024-3147

发布日期: 2024年4月12日

关联CVE: CVE-2024-31080   CVE-2024-31081   CVE-2024-31082   CVE-2024-31083  

  • 详细介绍

1. 漏洞描述

   

X.Org X11 X server

Security Fix(es):

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)

A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31082)

A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.(CVE-2024-31083)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-31080 KY3.4-5A xorg-x11-server Fixed
CVE-2024-31080 KY3.5.2 xorg-x11-server Fixed
CVE-2024-31081 KY3.4-5A xorg-x11-server Fixed
CVE-2024-31081 KY3.5.2 xorg-x11-server Fixed
CVE-2024-31082 KY3.4-5A xorg-x11-server Fixed
CVE-2024-31082 KY3.5.2 xorg-x11-server Fixed
CVE-2024-31083 KY3.4-5A xorg-x11-server Fixed
CVE-2024-31083 KY3.5.2 xorg-x11-server Fixed

3. 影响组件

    xorg-x11-server

4. 修复版本

   

KY3.4-5A

软件名称 架构 版本号
xorg-x11-server-help noarch 1.20.8-26.kb2.ky3_4
xorg-x11-server-devel x86_64 1.20.8-26.kb2.ky3_4
xorg-x11-server x86_64 1.20.8-26.kb2.ky3_4
xorg-x11-server-Xephyr x86_64 1.20.8-26.kb2.ky3_4
xorg-x11-server-Xephyr aarch64 1.20.8-26.kb2.ky3_4
xorg-x11-server-devel aarch64 1.20.8-26.kb2.ky3_4
xorg-x11-server aarch64 1.20.8-26.kb2.ky3_4

KY3.5.2

软件名称 架构 版本号
xorg-x11-server-source noarch 1.20.11-30.ky3_5.kb1
xorg-x11-server-help noarch 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xephyr x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-devel x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-common x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xvfb x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xdmx x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xnest x86_64 1.20.11-30.ky3_5.kb1
xorg-x11-server-common aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xvfb aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xdmx aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xnest aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server-Xephyr aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server aarch64 1.20.11-30.ky3_5.kb1
xorg-x11-server-devel aarch64 1.20.11-30.ky3_5.kb1

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.4-5A:

x86_64:

     xorg-x11-server-help   

     xorg-x11-server-devel   

     xorg-x11-server   

     xorg-x11-server-Xephyr   

aarch64:

     xorg-x11-server-help   

     xorg-x11-server-Xephyr   

     xorg-x11-server-devel   

     xorg-x11-server   

KY3.5.2:

x86_64:

     xorg-x11-server-source   

     xorg-x11-server-help   

     xorg-x11-server-Xephyr   

     xorg-x11-server-devel   

     xorg-x11-server-common   

     xorg-x11-server-Xvfb   

     xorg-x11-server   

     xorg-x11-server-Xdmx   

     xorg-x11-server-Xnest   

aarch64:

     xorg-x11-server-source   

     xorg-x11-server-help   

     xorg-x11-server-common   

     xorg-x11-server-Xvfb   

     xorg-x11-server-Xdmx   

     xorg-x11-server-Xnest   

     xorg-x11-server-Xephyr   

     xorg-x11-server   

     xorg-x11-server-devel   

上一篇:KylinSec-SA-2024-3146 下一篇:KylinSec-SA-2024-3148