Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-3940-1 | xorg-server security update | 
|  Debian DSA | DSA-5800-1 | xorg-server security update | 
|  EUVD | EUVD-2024-50449 | A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges. | 
|  Ubuntu USN | USN-7085-1 | X.Org X Server vulnerability | 
|  Ubuntu USN | USN-7085-2 | X.Org X Server vulnerability | 
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Mon, 04 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:rhel_els:6 | |
| References |  | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 13 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| References |  | 
Tue, 13 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::crb | |
| References |  | 
Tue, 26 Nov 2024 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:6 | 
Fri, 22 Nov 2024 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 | 
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Thu, 21 Nov 2024 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Aus Redhat rhel Els Redhat rhel Tus | |
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:rhel_aus:8.2::appstream cpe:/a:redhat:rhel_aus:8.4::appstream cpe:/a:redhat:rhel_aus:8.6::appstream cpe:/a:redhat:rhel_e4s:8.4::appstream cpe:/a:redhat:rhel_e4s:8.6::appstream cpe:/a:redhat:rhel_eus:8.8::appstream cpe:/a:redhat:rhel_eus:9.4::appstream cpe:/a:redhat:rhel_tus:8.4::appstream cpe:/a:redhat:rhel_tus:8.6::appstream cpe:/o:redhat:rhel_els:7 | |
| Vendors & Products | Redhat rhel Aus Redhat rhel Els Redhat rhel Tus | |
| References |  | 
 | 
Sat, 16 Nov 2024 02:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:8.8 | 
Thu, 14 Nov 2024 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.2 | 
Wed, 13 Nov 2024 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel E4s | |
| CPEs | cpe:/a:redhat:rhel_e4s:9.0::appstream | |
| Vendors & Products | Redhat rhel E4s | |
| References |  | 
Wed, 13 Nov 2024 18:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Redhat rhel Eus | |
| CPEs | cpe:/a:redhat:rhel_eus:9.2::appstream | |
| Vendors & Products | Redhat rhel Eus | |
| References |  | 
Tue, 05 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | 
Mon, 04 Nov 2024 23:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:8::appstream cpe:/a:redhat:enterprise_linux:8::crb | |
| References |  | 
Wed, 30 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 30 Oct 2024 07:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | Xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | 
| First Time appeared | Redhat Redhat enterprise Linux | |
| CPEs | cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 | |
| Vendors & Products | Redhat Redhat enterprise Linux | |
| References |  | 
Wed, 30 Oct 2024 01:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges. | |
| Title | xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability | |
| Weaknesses | CWE-122 | |
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-04T21:04:39.557Z
Reserved: 2024-10-08T13:45:31.259Z
Link: CVE-2024-9632
Updated: 2024-10-31T19:02:24.167Z
Status : Awaiting Analysis
Published: 2024-10-30T08:15:04.830
Modified: 2025-08-04T21:15:29.537
Link: CVE-2024-9632
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.