rpm package
suse/presentproto&distro=SUSE Linux Enterprise Module for Development Tools 15 SP6
pkg:rpm/suse/presentproto&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP6
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-31083 | Hig | 7.8 | < 1.3-150600.3.3.1 | 1.3-150600.3.3.1 | Apr 5, 2024 | A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g | |
| CVE-2024-31081 | Hig | 7.3 | < 1.3-150600.3.3.1 | 1.3-150600.3.3.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c | |
| CVE-2024-31080 | Hig | 7.3 | < 1.3-150600.3.3.1 | 1.3-150600.3.3.1 | Apr 4, 2024 | A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c |
- affected < 1.3-150600.3.3.1fixed 1.3-150600.3.3.1
A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted g
- affected < 1.3-150600.3.3.1fixed 1.3-150600.3.3.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c
- affected < 1.3-150600.3.3.1fixed 1.3-150600.3.3.1
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a c