CVE-2024-0229

Summary

CVECVE-2024-0229
StatePUBLISHED
AssignerUnknown
Source PriorityEnrichment-only fallback
PublishedUnknown
UpdatedUnknown
DescriptionDescription unavailable.

References

ReferenceSourceLinkTags
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 161304 Oracle Enterprise Linux Security Update for xorg-x11-server (ELSA-2024-0320)
  • 161327 Oracle Enterprise Linux Security Update for tigervnc (ELSA-2024-0557)
  • 161328 Oracle Enterprise Linux Security Update for tigervnc (ELSA-2024-0607)
  • 161332 Oracle Enterprise Linux Security Update for tigervnc (ELSA-2024-0629)
  • 200051 Ubuntu Security Notification for X.Org X Server Vulnerabilities (USN-6587-1)
  • 200058 Ubuntu Security Notification for X.Org X Server Vulnerabilities (USN-6587-2)
  • 200193 Ubuntu Security Notification for X.Org X Server Vulnerabilities (USN-6587-5)
  • 242726 Red Hat Update for xorg-x11-server (RHSA-2024:0320)
  • 242772 Red Hat Update for tigervnc (RHSA-2024:0558)
  • 242774 Red Hat Update for tigervnc (RHSA-2024:0597)
  • 242782 Red Hat Update for tigervnc (RHSA-2024:0607)
  • 242793 Red Hat Update for tigervnc (RHSA-2024:0617)
  • 242794 Red Hat Update for tigervnc (RHSA-2024:0614)
  • 242808 Red Hat Update for tigervnc (RHSA-2024:0621)
  • 242812 Red Hat Update for tigervnc (RHSA-2024:0626)
  • 242825 Red Hat Update for tigervnc (RHSA-2024:0629)
  • 242833 Red Hat Update for tigervnc (RHSA-2024:0557)
  • 257302 CentOS Security Update for xorg-x11-server (CESA-2024:0320)
  • 257305 CentOS Security Update for tigervnc (CESA-2024:0629)
  • 284893 Fedora Security Update for xorg (FEDORA-2024-05db4bcbec)
  • 285034 Fedora Security Update for tigervnc (FEDORA-2024-5762d637dd)
  • 285036 Fedora Security Update for xorg (FEDORA-2024-da3d410b53)
  • 357225 Amazon Linux Security Advisory for xorg-x11-server : ALAS2-2024-2455
  • 357249 Amazon Linux Security Advisory for xorg-x11-server : ALAS2023-2024-522
  • 510677 Alpine Linux Security Update for xorg-server
  • 510678 Alpine Linux Security Update for xwayland
  • 6000440 Debian Security Update for xorg-server (DSA 5603-1)
  • 6000449 Debian Security Update for xorg-server (DLA 3721-1)
  • 673399 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1352)
  • 673626 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1232)
  • 673929 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1254)
  • 673935 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1330)
  • 674121 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1522)
  • 674159 EulerOS Security Update for xorg-x11-server (EulerOS-SA-2024-1501)
  • 691397 Free Berkeley Software Distribution (FreeBSD) Security Update for xorg server (7467c611-b490-11ee-b903-001fc69cd6dc)
  • 710847 Gentoo Linux X.Org X Server, XWayland Multiple Vulnerabilities (GLSA 202401-30)
  • 755633 SUSE Enterprise Linux Security Update for xwayland (SUSE-SU-2024:0165-1)
  • 941559 AlmaLinux Security Update for tigervnc (ALSA-2024:0607)
  • 941561 AlmaLinux Security Update for tigervnc (ALSA-2024:0557)
  • 961113 Rocky Linux Security Update for tigervnc (RLSA-2024:0607)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report