First published: Sun Dec 31 2006(Updated: )
Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xorg-server | 2:1.20.4-1+deb10u4 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 | |
X Server (X.Org) | =6.8.2 | |
X Server (X.Org) | =7.1 | |
XFree86 | ||
X Server (X.Org) | =6.9.0 | |
X Server (X.Org) | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6101 has a high severity rating due to the potential for local users to execute arbitrary code.
To fix CVE-2006-6101, update the X.Org server to a secure version as specified in your distribution's security advisory.
CVE-2006-6101 affects local users running vulnerable versions of the X.Org server or XFree86.
Systems running X.Org versions 6.8.2, 6.9.0, 7.0, 7.1, and XFree86 are vulnerable to CVE-2006-6101.
CVE-2006-6101 involves the ProcRenderAddGlyphs function within the Render extension of the X server.