The problem is in the _XkbSetCompatMap() function, where incorrectly updating the heap size can lead to a buffer overflow. Exploiting the vulnerability involves sending a modified bitmap to the server; this can increase privileges when running the server as root. Remote exploitation is possible if X11 is used over SSH.

X.Org Server 21.1.4 and XWayland 24.1.4 were released to fix the vulnerability.

Users are strongly recommended to update to these versions to protect their systems.

Source: Ferra

Previous articleLeaked list of mobile phones that will receive HyperOS 2.0 GLOBAL: there is very good news
Next articleThe new MacBook Pro M4 has the longest battery life on Macs in history
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here