Описание
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | code not present |
esm-infra/xenial | not-affected | code not present |
jammy | not-affected | code not present |
noble | not-affected | code not present |
oracular | not-affected | code not present |
plucky | not-affected | code not present |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/xenial | not-affected | code not present |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/bionic | not-affected | code not present |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | pending | 2:21.1.18-1ubuntu1 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | released | 2:1.19.6-1ubuntu4.15+esm13 |
esm-infra/focal | released | 2:1.20.13-1ubuntu1~20.04.20+esm1 |
esm-infra/xenial | released | 2:1.18.4-0ubuntu0.12+esm18 |
jammy | released | 2:21.1.4-2ubuntu1.7~22.04.15 |
noble | released | 2:21.1.12-1ubuntu1.4 |
oracular | released | 2:21.1.13-2ubuntu1.4 |
plucky | released | 2:21.1.16-1ubuntu1.1 |
upstream | released | 21.1.17 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/xenial | released | 2:1.19.6-1ubuntu4.1~16.04.6+esm10 |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra/bionic | released | 2:1.20.8-2ubuntu2.2~18.04.11+esm5 |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2:24.1.6-1ubuntu1 |
jammy | released | 2:22.1.1-1ubuntu0.19 |
noble | released | 2:23.2.6-1ubuntu0.6 |
oracular | released | 2:24.1.2-1ubuntu0.6 |
plucky | released | 2:24.1.6-1ubuntu0.1 |
upstream | released | 24.1.7 |
Показывать по
EPSS
7.8 High
CVSS3
Связанные уязвимости
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
A flaw was found in the RandR extension, where the RRChangeProviderPro ...
A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
Уязвимость функции RRChangeProviderProperty() сервера X Window System Xorg-server, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.8 High
CVSS3