CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
AI Score
Confidence
High
EPSS
Percentile
15.5%
The X.org server is vulnerable to Buffer Over-read. The vulnerability is due to improper handling of byte-swapped length values in the ProcAppleDRICreatePixmap() function, potentially leading to memory leakage and segmentation faults, especially when triggered by a client with a different endianness. An attacker could exploit this vulnerability to cause the X server to read heap memory values and transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker’s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
www.openwall.com/lists/oss-security/2024/04/03/13
www.openwall.com/lists/oss-security/2024/04/12/10
access.redhat.com/security/cve/CVE-2024-31082
bugzilla.redhat.com/show_bug.cgi?id=2271999
lists.x.org/archives/xorg-announce/2024-April/003497.html
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.19/community.yaml