A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3787-1 xorg-server security update
Debian DSA Debian DSA DSA-5657-1 xorg-server security update
EUVD EUVD EUVD-2024-28991 A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
Ubuntu USN Ubuntu USN USN-6721-1 X.Org X Server vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

References
Link Providers
http://www.openwall.com/lists/oss-security/2024/04/03/13 cve-icon
http://www.openwall.com/lists/oss-security/2024/04/12/10 cve-icon
https://access.redhat.com/errata/RHSA-2024:1785 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2036 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2037 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2038 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2039 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2040 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2041 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2042 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2080 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:2616 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:3258 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:3261 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:3343 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:9093 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2024:9122 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2025:12751 cve-icon cve-icon
https://access.redhat.com/security/cve/CVE-2024-31080 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=2271997 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/ cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/ cve-icon
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/ cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2024-31080 cve-icon
https://www.cve.org/CVERecord?id=CVE-2024-31080 cve-icon
History

Mon, 04 Aug 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:6
Vendors & Products Redhat rhel Els
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00102}

epss

{'score': 0.00105}


Sat, 05 Jul 2025 03:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Fri, 22 Nov 2024 12:00:00 +0000


Tue, 12 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::crb
References

Wed, 06 Nov 2024 15:15:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-08-04T21:06:17.457Z

Reserved: 2024-03-28T02:56:55.574Z

Link: CVE-2024-31080

cve-icon Vulnrichment

Updated: 2024-08-02T01:46:04.428Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T14:15:10.330

Modified: 2025-08-04T21:15:28.873

Link: CVE-2024-31080

cve-icon Redhat

Severity : Important

Publid Date: 2024-04-03T00:00:00Z

Links: CVE-2024-31080 - Bugzilla

cve-icon OpenCVE Enrichment

No data.