Описание
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [code not present]] |
| esm-infra/xenial | not-affected | code not present |
| precise/esm | DNE | |
| trusty | not-affected | code not present |
| trusty/esm | DNE | trusty was not-affected [code not present] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | not-affected | code not present |
| yakkety | not-affected | code not present |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/xenial | not-affected | code not present |
| precise/esm | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | not-affected | code not present |
| yakkety | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2:1.19.3-1ubuntu3 |
| esm-infra-legacy/trusty | released | 2:1.15.1-0ubuntu2.9 |
| esm-infra/xenial | released | 2:1.18.4-0ubuntu0.3 |
| precise/esm | DNE | |
| trusty | released | 2:1.15.1-0ubuntu2.9 |
| trusty/esm | released | 2:1.15.1-0ubuntu2.9 |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 2:1.18.4-0ubuntu0.3 |
| yakkety | ignored | end of life |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/xenial | released | 2:1.18.4-1ubuntu6.1~16.04.2 |
| precise/esm | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 2:1.18.4-1ubuntu6.1~16.04.2 |
| yakkety | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of life]] |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | trusty was ignored [end of life] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | DNE | |
| yakkety | DNE | |
| zesty | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of life]] |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | trusty was ignored [end of life] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | DNE | |
| yakkety | DNE | |
| zesty | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of life]] |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE | trusty was ignored [end of life] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | DNE | |
| yakkety | DNE | |
| zesty | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [2:1.18.3-1ubuntu2.3~trusty2]] |
| precise/esm | DNE | |
| trusty | released | 2:1.18.3-1ubuntu2.3~trusty2 |
| trusty/esm | DNE | trusty was released [2:1.18.3-1ubuntu2.3~trusty2] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | DNE | |
| yakkety | DNE | |
| zesty | DNE |
Показывать по
6.5 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
In the X.Org X server before 2017-06-19, a user authenticated to an X ...
In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
6.5 Medium
CVSS2
8.8 High
CVSS3