CVE-2024-21885

NameCVE-2024-21885
DescriptionA flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3721-1, DSA-5603-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)buster2:1.20.4-1+deb10u4vulnerable
buster (security)2:1.20.4-1+deb10u14fixed
bullseye2:1.20.11-1+deb11u11fixed
bullseye (security)2:1.20.11-1+deb11u13fixed
bookworm2:21.1.7-3+deb12u5fixed
bookworm (security)2:21.1.7-3+deb12u7fixed
sid, trixie2:21.1.12-1fixed
xwayland (PTS)bookworm2:22.1.9-1vulnerable
trixie2:23.2.4-1fixed
sid2:23.2.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xorg-serversourcebuster2:1.20.4-1+deb10u13DLA-3721-1
xorg-serversourcebullseye2:1.20.11-1+deb11u11DSA-5603-1
xorg-serversourcebookworm2:21.1.7-3+deb12u5DSA-5603-1
xorg-serversource(unstable)2:21.1.11-1
xwaylandsource(unstable)2:23.2.4-1

Notes

[bookworm] - xwayland <no-dsa> (Minor issue; Xwayland shouldn't be running as root)
https://lists.x.org/archives/xorg/2024-January/061525.html
https://gitlab.freedesktop.org/xorg/xserver/-/commit/4a5e9b1895627d40d26045bd0b7ef3dce503cbd1

Search for package or bug name: Reporting problems