CVE-2024-21885

NameCVE-2024-21885
DescriptionA flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3721-1, DSA-5603-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)bullseye2:1.20.11-1+deb11u13fixed
bullseye (security)2:1.20.11-1+deb11u14fixed
bookworm, bookworm (security)2:21.1.7-3+deb12u8fixed
trixie2:21.1.14-1fixed
sid2:21.1.14-2fixed
xwayland (PTS)bookworm2:22.1.9-1vulnerable
sid, trixie2:24.1.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xorg-serversourcebuster2:1.20.4-1+deb10u13DLA-3721-1
xorg-serversourcebullseye2:1.20.11-1+deb11u11DSA-5603-1
xorg-serversourcebookworm2:21.1.7-3+deb12u5DSA-5603-1
xorg-serversource(unstable)2:21.1.11-1
xwaylandsource(unstable)2:23.2.4-1

Notes

[bookworm] - xwayland <ignored> (Minor issue; Xwayland shouldn't be running as root)
https://lists.x.org/archives/xorg/2024-January/061525.html
https://gitlab.freedesktop.org/xorg/xserver/-/commit/4a5e9b1895627d40d26045bd0b7ef3dce503cbd1

Search for package or bug name: Reporting problems