Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-6478

Опубликовано: 13 дек. 2023
Источник: debian
EPSS Низкий

Описание

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xorg-serverfixed2:21.1.10-1package
xwaylandfixed2:23.2.3-1package
xwaylandignoredbookwormpackage

Примечания

  • https://lists.x.org/archives/xorg-announce/2023-December/003435.html

  • Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632

EPSS

Процентиль: 78%
0.01208
Низкий

Связанные уязвимости

CVSS3: 7.6
ubuntu
почти 2 года назад

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

CVSS3: 7.6
redhat
почти 2 года назад

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

CVSS3: 7.6
nvd
почти 2 года назад

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

CVSS3: 7.5
msrc
почти 2 года назад

Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty

CVSS3: 7.6
github
почти 2 года назад

A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

EPSS

Процентиль: 78%
0.01208
Низкий