CVE-2024-31083
Description
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-31083 is a use-after-free vulnerability in Xorg's ProcRenderAddGlyphs() that lets an authenticated attacker execute arbitrary code.
Vulnerability
Overview
CVE-2024-31083 is a use-after-free vulnerability found in the ProcRenderAddGlyphs() function of Xorg servers. The root cause lies in the AllocateGlyph() routine, which can store multiple references to the same non-refcounted glyph when processing new glyphs sent by the client. When ProcRenderAddGlyphs() subsequently frees one of these glyphs, the remaining dangling pointers lead to a use-after-free condition [1][2].
Exploitation
An attacker must already have the ability to send crafted requests to the X server (local access as an authenticated user). By submitting a specially crafted glyph request, the attacker triggers the faulty allocation and freeing logic, causing the server to access freed memory. No additional authentication beyond a valid X session is required, making this a locally exploitable issue [1][2].
Impact
Successful exploitation allows the attacker to execute arbitrary code on the system with the privileges of the X server (typically root). Because the X server runs with elevated privileges, this can lead to a full compromise of the affected system. The CVSS v3 score is 7.8 (High), reflecting the high impact on confidentiality, integrity, and availability [1][2].
Mitigation
Status
Red Hat has released updates for Red Hat Enterprise Linux 9 to address this vulnerability in both the tigervnc (RHSA-2024:2616) and xorg-x11-server (RHSA-2024:2040, RHSA-2024:3258, RHSA-2024:9122) packages. Administrators should apply these patches promptly. No workarounds are documented; the recommended action is to update the affected packages [1][2][3][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
67- osv-coords66 versionspkg:apk/chainguard/gtfpkg:apk/chainguard/Xnestpkg:apk/chainguard/xorg-serverpkg:apk/chainguard/xorg-server-commonpkg:apk/chainguard/xorg-server-devpkg:apk/chainguard/xorg-server-docpkg:apk/chainguard/Xvfbpkg:apk/chainguard/xvfb-runpkg:apk/wolfi/gtfpkg:apk/wolfi/Xnestpkg:apk/wolfi/xorg-serverpkg:apk/wolfi/xorg-server-commonpkg:apk/wolfi/xorg-server-devpkg:apk/wolfi/xorg-server-docpkg:apk/wolfi/Xvfbpkg:apk/wolfi/xvfb-runpkg:rpm/almalinux/tigervncpkg:rpm/almalinux/tigervnc-iconspkg:rpm/almalinux/tigervnc-licensepkg:rpm/almalinux/tigervnc-selinuxpkg:rpm/almalinux/tigervnc-serverpkg:rpm/almalinux/tigervnc-server-minimalpkg:rpm/almalinux/tigervnc-server-modulepkg:rpm/almalinux/xorg-x11-server-commonpkg:rpm/almalinux/xorg-x11-server-develpkg:rpm/almalinux/xorg-x11-server-sourcepkg:rpm/almalinux/xorg-x11-server-Xdmxpkg:rpm/almalinux/xorg-x11-server-Xephyrpkg:rpm/almalinux/xorg-x11-server-Xnestpkg:rpm/almalinux/xorg-x11-server-Xorgpkg:rpm/almalinux/xorg-x11-server-Xvfbpkg:rpm/almalinux/xorg-x11-server-Xwaylandpkg:rpm/almalinux/xorg-x11-server-Xwayland-develpkg:rpm/opensuse/dri3proto&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/dri3proto&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/presentproto&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/wayland-protocols&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xwayland&distro=openSUSE%20Leap%2015.6pkg:rpm/rocky-linux/tigervnc?distro=rocky-linux-9&epoch=0pkg:rpm/suse/dri3proto&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/dri3proto&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/presentproto&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6pkg:rpm/suse/wayland-protocols&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/xorg-x11-server&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5pkg:rpm/suse/xwayland&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6
< 21.1.12-r0+ 65 more
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 21.1.12-r0
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.13.1-2.el8_9.10.alma.1
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 1.20.11-23.el8_10
- (no CPE)range: < 21.1.3-16.el8_10
- (no CPE)range: < 23.2.7-1.el9
- (no CPE)range: < 1.2-150100.6.3.1
- (no CPE)range: < 1.2-150100.6.3.1
- (no CPE)range: < 1.3-150600.3.3.1
- (no CPE)range: < 1.36-150600.4.3.1
- (no CPE)range: < 21.1.4-150500.7.26.1
- (no CPE)range: < 22.1.5-150500.7.22.1
- (no CPE)range: < 24.1.1-150600.5.3.1
- (no CPE)range: < 0:1.13.1-8.el9_4.3
- (no CPE)range: < 1.2-150100.6.3.1
- (no CPE)range: < 1.2-150100.6.3.1
- (no CPE)range: < 1.3-150600.3.3.1
- (no CPE)range: < 1.36-150600.4.3.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 21.1.4-150500.7.26.1
- (no CPE)range: < 21.1.4-150500.7.26.1
- (no CPE)range: < 1.19.6-10.71.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 1.19.6-10.71.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 1.19.6-10.71.1
- (no CPE)range: < 1.20.3-150200.22.5.96.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 1.20.3-150400.38.48.1
- (no CPE)range: < 22.1.5-150500.7.22.1
- (no CPE)range: < 24.1.1-150600.5.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
24- www.openwall.com/lists/oss-security/2024/04/03/13nvd
- www.openwall.com/lists/oss-security/2024/04/12/10nvd
- access.redhat.com/errata/RHSA-2024:1785nvd
- access.redhat.com/errata/RHSA-2024:2036nvd
- access.redhat.com/errata/RHSA-2024:2037nvd
- access.redhat.com/errata/RHSA-2024:2038nvd
- access.redhat.com/errata/RHSA-2024:2039nvd
- access.redhat.com/errata/RHSA-2024:2040nvd
- access.redhat.com/errata/RHSA-2024:2041nvd
- access.redhat.com/errata/RHSA-2024:2042nvd
- access.redhat.com/errata/RHSA-2024:2080nvd
- access.redhat.com/errata/RHSA-2024:2616nvd
- access.redhat.com/errata/RHSA-2024:3258nvd
- access.redhat.com/errata/RHSA-2024:3261nvd
- access.redhat.com/errata/RHSA-2024:3343nvd
- access.redhat.com/errata/RHSA-2024:9093nvd
- access.redhat.com/errata/RHSA-2024:9122nvd
- access.redhat.com/errata/RHSA-2025:12751nvd
- access.redhat.com/security/cve/CVE-2024-31083nvd
- bugzilla.redhat.com/show_bug.cginvd
- lists.debian.org/debian-lts-announce/2024/04/msg00009.htmlnvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/nvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/nvd
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/nvd
News mentions
0No linked articles in our index yet.