Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-3787-1 | xorg-server security update | 
|  Debian DSA | DSA-5657-1 | xorg-server security update | 
|  EUVD | EUVD-2024-28991 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads. | 
|  Ubuntu USN | USN-6721-1 | X.Org X Server vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Mon, 04 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Els | |
| CPEs | cpe:/o:redhat:rhel_els:6 | |
| Vendors & Products | Redhat rhel Els | |
| References |  | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Sat, 05 Jul 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 | 
Fri, 22 Nov 2024 12:00:00 +0000
Tue, 12 Nov 2024 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::crb | |
| References |  | 
Wed, 06 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 |  | 
| Metrics | ssvc 
 | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-04T21:06:17.457Z
Reserved: 2024-03-28T02:56:55.574Z
Link: CVE-2024-31080
Updated: 2024-08-02T01:46:04.428Z
Status : Awaiting Analysis
Published: 2024-04-04T14:15:10.330
Modified: 2025-08-04T21:15:28.873
Link: CVE-2024-31080
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.