{"id":"MGASA-2024-0357","summary":"Updated x11-server, x11-server-xwayland & tigervnc packages fix security vulnerability","details":"Due to an improperly tracked allocation size in _XkbSetCompatMap, a local\nattacker may be able to trigger a buffer overflow condition via a\nspecially-crafted payload, leading to denial of service or local\nprivilege escalation in distributions where the X.org server is run with\nroot privileges. (CVE-2024-9632)\n","modified":"2026-04-16T04:40:52.562998689Z","published":"2024-11-12T19:53:59Z","upstream":["CVE-2024-9632"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2024-0357.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=33710"},{"type":"WEB","url":"https://www.openwall.com/lists/oss-security/2024/10/29/2"}],"affected":[{"package":{"name":"x11-server","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/x11-server?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.1.8-7.6.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0357.json"}},{"package":{"name":"x11-server-xwayland","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/x11-server-xwayland?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"22.1.9-1.6.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0357.json"}},{"package":{"name":"tigervnc","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/tigervnc?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.1-2.6.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2024-0357.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}