Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-49176

Опубликовано: 17 июн. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xorg-serverfixed2:21.1.16-1.3package
xwaylandfixed2:24.1.8-1package
xwaylandignoredtrixiepackage
xwaylandignoredbookwormpackage

Примечания

  • Fixed by: https://gitlab.freedesktop.org/xorg/xserver/-/commit/03731b326a80b582e48d939fe62cb1e2b10400d9

  • Followup: https://gitlab.freedesktop.org/xorg/xserver/-/commit/4fc4d76b2c7aaed61ed2653f997783a3714c4fe1

EPSS

Процентиль: 12%
0.00041
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
6 месяцев назад

A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.

CVSS3: 7.3
redhat
6 месяцев назад

A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.

CVSS3: 7.3
nvd
6 месяцев назад

A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.

CVSS3: 6.6
msrc
5 месяцев назад

Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in big requests extension

suse-cvrf
6 месяцев назад

Security update for xorg-x11-server

EPSS

Процентиль: 12%
0.00041
Низкий