Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3721-1 | xorg-server security update |
Debian DSA |
DSA-5603-1 | xorg-server security update |
EUVD |
EUVD-2024-19496 | A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments. |
Ubuntu USN |
USN-6587-1 | X.Org X Server vulnerabilities |
Ubuntu USN |
USN-6587-2 | X.Org X Server vulnerabilities |
Ubuntu USN |
USN-6587-5 | X.Org X Server vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Mon, 04 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Els
|
|
| CPEs | cpe:/o:redhat:rhel_els:6 | |
| Vendors & Products |
Redhat rhel Els
|
|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-13T13:36:52.093Z
Reserved: 2024-01-02T21:57:08.796Z
Link: CVE-2024-21885
Updated: 2024-08-01T22:35:33.394Z
Status : Awaiting Analysis
Published: 2024-02-28T13:15:08.197
Modified: 2025-08-04T21:15:28.523
Link: CVE-2024-21885
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN