CVE-2024-9632
Severity CVSS v4.0:
Pending analysis
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
30/10/2024
Last modified:
15/04/2026
Description
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:10090
- https://access.redhat.com/errata/RHSA-2024:8798
- https://access.redhat.com/errata/RHSA-2024:9540
- https://access.redhat.com/errata/RHSA-2024:9579
- https://access.redhat.com/errata/RHSA-2024:9601
- https://access.redhat.com/errata/RHSA-2024:9690
- https://access.redhat.com/errata/RHSA-2024:9816
- https://access.redhat.com/errata/RHSA-2024:9818
- https://access.redhat.com/errata/RHSA-2024:9819
- https://access.redhat.com/errata/RHSA-2024:9820
- https://access.redhat.com/errata/RHSA-2024:9901
- https://access.redhat.com/errata/RHSA-2025:12751
- https://access.redhat.com/errata/RHSA-2025:7163
- https://access.redhat.com/errata/RHSA-2025:7165
- https://access.redhat.com/errata/RHSA-2025:7458
- https://access.redhat.com/security/cve/CVE-2024-9632
- https://bugzilla.redhat.com/show_bug.cgi?id=2317233
- http://seclists.org/fulldisclosure/2024/Oct/20
- http://www.openwall.com/lists/oss-security/2024/10/29/2
- https://lists.debian.org/debian-lts-announce/2024/10/msg00031.html



