Описание
Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1:1.0.2-0ubuntu10.13 |
devel | released | 2:1.4.1~git20080131-1ubuntu12 |
feisty | released | 2:1.2.0-3ubuntu8.4 |
gutsy | released | 2:1.3.0.0.dfsg-12ubuntu8.4 |
hardy | released | 2:1.4.1~git20080131-1ubuntu9.2 |
upstream | released |
Показывать по
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
Integer overflow in the ProcRenderCreateCursor function in the Render ...
Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
ELSA-2008-0504: xorg-x11-server security update (IMPORTANT)
6.8 Medium
CVSS2