First published: Sun Dec 31 2006(Updated: )
Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
X.org X.org | =6.8.2 | |
X.org X.org | =7.1 | |
Xfree86 Project Xfree86 | ||
X.org X.org | =6.9.0 | |
X.org X.org | =7.0 | |
debian/xorg-server | 2:1.20.4-1+deb10u4 2:1.20.4-1+deb10u9 2:1.20.11-1+deb11u6 2:21.1.7-3 2:21.1.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.