cvelist/2024/9xxx/CVE-2024-9632.json

198 lines
9.2 KiB
JSON
Raw Normal View History

2024-10-08 14:00:36 +00:00
{
2024-10-30 08:00:31 +00:00
"data_version": "4.0",
2024-10-08 14:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-9632",
2024-10-30 08:00:31 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2024-10-08 14:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-10-30 08:00:31 +00:00
"value": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Heap-based Buffer Overflow",
"cweId": "CWE-122"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
2024-11-05 00:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 8",
2024-10-30 08:00:31 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-11-05 00:00:35 +00:00
"versions": [
{
"version": "0:1.20.11-25.el8_10",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
2024-10-30 08:00:31 +00:00
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-11-05 00:00:35 +00:00
"versions": [
{
"version": "0:21.1.3-17.el8_10",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
2024-10-30 08:00:31 +00:00
}
}
]
}
},
2024-11-13 19:00:33 +00:00
{
"product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:1.12.0-14.el9_2.9",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
2024-10-30 08:00:31 +00:00
{
2024-11-05 00:00:35 +00:00
"product_name": "Red Hat Enterprise Linux 7",
2024-10-30 08:00:31 +00:00
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
2024-11-05 00:00:35 +00:00
"defaultStatus": "unknown"
2024-10-30 08:00:31 +00:00
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
2024-11-05 00:00:35 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:8798",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:8798"
},
2024-11-13 19:00:33 +00:00
{
"url": "https://access.redhat.com/errata/RHSA-2024:9579",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:9579"
},
2024-10-30 08:00:31 +00:00
{
"url": "https://access.redhat.com/security/cve/CVE-2024-9632",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-9632"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
}
]
},
"work_around": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2024-10-08 14:00:36 +00:00
}
]
}
}