2024-10-08 14:00:36 +00:00
{
2024-10-30 08:00:31 +00:00
"data_version" : "4.0" ,
2024-10-08 14:00:36 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2024-9632" ,
2024-10-30 08:00:31 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
2024-10-08 14:00:36 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-10-30 08:00:31 +00:00
"value" : "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Heap-based Buffer Overflow" ,
"cweId" : "CWE-122"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Red Hat" ,
"product" : {
"product_data" : [
2024-11-21 19:00:30 +00:00
{
"product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.8.0-34.el7_9" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-10-30 08:00:31 +00:00
{
2024-11-05 00:00:35 +00:00
"product_name" : "Red Hat Enterprise Linux 8" ,
2024-10-30 08:00:31 +00:00
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-05 00:00:35 +00:00
"versions" : [
{
"version" : "0:1.20.11-25.el8_10" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
2024-10-30 08:00:31 +00:00
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-05 00:00:35 +00:00
"versions" : [
{
"version" : "0:21.1.3-17.el8_10" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-21 19:00:30 +00:00
"versions" : [
{
"version" : "0:1.13.1-14.el8_10" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
2024-11-05 00:00:35 +00:00
"defaultStatus" : "affected"
2024-10-30 08:00:31 +00:00
}
}
]
}
} ,
2024-11-13 20:00:33 +00:00
{
2024-11-21 19:00:30 +00:00
"product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support" ,
2024-11-13 20:00:33 +00:00
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
2024-11-21 19:00:30 +00:00
"version" : "0:1.9.0-15.el8_2.12" ,
2024-11-13 20:00:33 +00:00
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-11-13 19:00:33 +00:00
{
2024-11-21 19:00:30 +00:00
"product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support" ,
2024-11-13 19:00:33 +00:00
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
2024-11-21 19:00:30 +00:00
"version" : "0:1.11.0-8.el8_4.11" ,
2024-11-13 19:00:33 +00:00
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-10-30 08:00:31 +00:00
{
2024-11-21 19:00:30 +00:00
"product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service" ,
2024-10-30 08:00:31 +00:00
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-21 19:00:30 +00:00
"versions" : [
{
"version" : "0:1.11.0-8.el8_4.11" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
2024-10-30 08:00:31 +00:00
"defaultStatus" : "affected"
}
2024-11-21 19:00:30 +00:00
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions" ,
"version" : {
"version_data" : [
2024-10-30 08:00:31 +00:00
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-21 19:00:30 +00:00
"versions" : [
{
"version" : "0:1.11.0-8.el8_4.11" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.12.0-6.el8_6.12" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.12.0-6.el8_6.12" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.12.0-6.el8_6.12" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.12.0-15.el8_8.11" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
2024-10-30 08:00:31 +00:00
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 9" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
2024-11-21 19:00:30 +00:00
"versions" : [
{
"version" : "0:1.14.1-1.el9_5" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
2024-10-30 08:00:31 +00:00
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
}
]
}
2024-11-21 19:00:30 +00:00
} ,
{
"product_name" : "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.11.0-22.el9_0.12" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.12.0-14.el9_2.9" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:1.13.1-8.el9_4.4" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-11-26 18:00:29 +00:00
{
"product_name" : "Red Hat Enterprise Linux 6" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
}
]
}
} ,
2024-11-21 19:00:30 +00:00
{
"product_name" : "Red Hat Enterprise Linux 7" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
}
]
}
2024-10-30 08:00:31 +00:00
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
2024-11-21 19:00:30 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:10090" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:10090"
} ,
2024-11-05 00:00:35 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:8798" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:8798"
} ,
2024-11-21 19:00:30 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9540" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9540"
} ,
2024-11-13 19:00:33 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9579" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9579"
} ,
2024-11-13 20:00:33 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9601" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9601"
} ,
2024-11-21 19:00:30 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9690" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9690"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9816" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9816"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9818" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9818"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9819" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9819"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9820" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9820"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:9901" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:9901"
} ,
2024-10-30 08:00:31 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2024-9632" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2024-9632"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2317233" ,
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
}
]
} ,
"work_around" : [
{
"lang" : "en" ,
"value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
] ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "LOW" ,
"attackVector" : "LOCAL" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
2024-10-08 14:00:36 +00:00
}
]
}
}