Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0409: Out-of-bounds Write

0
High
VulnerabilityCVE-2024-0409cvecve-2024-0409
Published: Thu Jan 18 2024 (01/18/2024, 15:40:22 UTC)
Source: CVE Database V5

Description

A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:01:38 UTC

Technical Analysis

CVE-2024-0409 is an out-of-bounds write vulnerability identified in the X.Org server version 21.1.0, specifically within the cursor handling code of Xephyr and Xwayland components. The root cause is the misuse of private data types during cursor creation: the code incorrectly uses the cursor bits type with the cursor as private data. This mismatch leads to an out-of-bounds write that overwrites the XSELINUX security context, a critical structure used for enforcing SELinux policies. Overwriting this context can allow an attacker to escalate privileges or bypass security controls, potentially leading to full system compromise. The vulnerability requires local access with low privileges and does not require user interaction, making it a significant risk in multi-user or shared environments. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity but requiring local privileges. Although no known exploits are reported in the wild, the vulnerability's nature and impact make it a critical concern for affected systems. The flaw affects Linux systems running X.Org server 21.1.0 with Xephyr or Xwayland enabled, which are common in graphical desktop environments and nested X server setups. The vulnerability was published on January 18, 2024, and assigned by Red Hat, indicating its recognition in enterprise Linux distributions. No patches were linked at the time of reporting, so users should monitor vendor advisories closely.

Potential Impact

The vulnerability allows an attacker with local low-level privileges to perform an out-of-bounds write that overwrites the XSELINUX context, potentially bypassing SELinux security policies. This can lead to privilege escalation, unauthorized access to sensitive data, and disruption of system availability. Systems running graphical environments with Xephyr or Xwayland are at risk, including desktops, developer workstations, and servers using nested X servers. The impact is severe because it compromises confidentiality, integrity, and availability simultaneously. Organizations relying on SELinux for mandatory access control are particularly vulnerable to policy bypass. The requirement for local access limits remote exploitation but does not eliminate risk in multi-user or compromised environments. The absence of known exploits currently reduces immediate threat but the high severity score and potential for privilege escalation make timely mitigation critical. The vulnerability could be leveraged in targeted attacks against high-value Linux systems, especially in environments where X.Org server 21.1.0 is deployed.

Mitigation Recommendations

1. Apply official patches from X.Org server maintainers or Linux distribution vendors as soon as they become available. 2. Until patches are released, restrict local access to trusted users only and monitor for unusual activity related to X.Org server processes. 3. Disable or limit the use of Xephyr and Xwayland if not required, reducing the attack surface. 4. Employ SELinux in enforcing mode and audit SELinux denials to detect potential exploitation attempts. 5. Use system-level access controls such as Linux namespaces or containers to isolate graphical sessions. 6. Regularly update all related software components to incorporate security fixes. 7. Conduct security awareness training for users with local access to understand the risks of privilege escalation vulnerabilities. 8. Monitor security advisories from Red Hat, Debian, Ubuntu, and other distributions for updates on this CVE. 9. Implement host-based intrusion detection systems to identify anomalous behavior indicative of exploitation. 10. Consider network segmentation to limit lateral movement if a local compromise occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-01-10T21:15:38.712Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ebfd49f5a9374a9cb43f8

Added to database: 11/20/2025, 7:14:28 AM

Last enriched: 2/28/2026, 11:01:38 AM

Last updated: 3/25/2026, 2:06:21 AM

Views: 140

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses