vulnerability
CentOS Linux: CVE-2024-0408: Important: xorg-x11-server security update (CESA-2024:0320)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jan 18, 2024 | Jan 23, 2024 | Jan 28, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 18, 2024
Added
Jan 23, 2024
Modified
Jan 28, 2025
Description
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
Solutions
centos-upgrade-xorg-x11-server-commoncentos-upgrade-xorg-x11-server-debuginfocentos-upgrade-xorg-x11-server-develcentos-upgrade-xorg-x11-server-sourcecentos-upgrade-xorg-x11-server-xdmxcentos-upgrade-xorg-x11-server-xephyrcentos-upgrade-xorg-x11-server-xnestcentos-upgrade-xorg-x11-server-xorgcentos-upgrade-xorg-x11-server-xvfbcentos-upgrade-xorg-x11-server-xwayland
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.