Описание
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 1.8.1-2ubuntu3 |
| lucid | released | 1.5-2ubuntu0.1 |
| precise | released | 1.8.1-1ubuntu0.2 |
| quantal | released | 1.8.1-1ubuntu1.1 |
| raring | released | 1.8.1-2ubuntu2.1 |
| upstream | pending | 1.8.1-2+deb7u1,1.9.1 |
Показывать по
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to t ...
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.8 Medium
CVSS2