摘要:
xorg-x11-server security update
安全等级: High
公告ID: KylinSec-SA-2024-3147
发布日期: 2024年4月12日
关联CVE: CVE-2024-31080 CVE-2024-31081 CVE-2024-31082 CVE-2024-31083
X.Org X11 X server
Security Fix(es):
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31080)
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31081)
A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.(CVE-2024-31082)
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.(CVE-2024-31083)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-31080 | KY3.4-5A | xorg-x11-server | Fixed |
CVE-2024-31080 | KY3.5.2 | xorg-x11-server | Fixed |
CVE-2024-31081 | KY3.4-5A | xorg-x11-server | Fixed |
CVE-2024-31081 | KY3.5.2 | xorg-x11-server | Fixed |
CVE-2024-31082 | KY3.4-5A | xorg-x11-server | Fixed |
CVE-2024-31082 | KY3.5.2 | xorg-x11-server | Fixed |
CVE-2024-31083 | KY3.4-5A | xorg-x11-server | Fixed |
CVE-2024-31083 | KY3.5.2 | xorg-x11-server | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
xorg-x11-server-help | noarch | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server-devel | x86_64 | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server | x86_64 | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server-Xephyr | x86_64 | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server-Xephyr | aarch64 | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server-devel | aarch64 | 1.20.8-26.kb2.ky3_4 |
xorg-x11-server | aarch64 | 1.20.8-26.kb2.ky3_4 |
软件名称 | 架构 | 版本号 |
---|---|---|
xorg-x11-server-source | noarch | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-help | noarch | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xephyr | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-devel | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-common | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xvfb | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xdmx | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xnest | x86_64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-common | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xvfb | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xdmx | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xnest | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-Xephyr | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server | aarch64 | 1.20.11-30.ky3_5.kb1 |
xorg-x11-server-devel | aarch64 | 1.20.11-30.ky3_5.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名