rpm package
opensuse/xorg-x11-server&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/xorg-x11-server&distro=openSUSE%20Tumbleweed
Vulnerabilities (82)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2006-6102 | — | < 1.20.13-1.2 | 1.20.13-1.2 | Dec 31, 2006 | Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified da | ||
| CVE-2006-6101 | — | < 1.20.13-1.2 | 1.20.13-1.2 | Dec 31, 2006 | Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph manage |
- CVE-2006-6102Dec 31, 2006affected < 1.20.13-1.2fixed 1.20.13-1.2
Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified da
- CVE-2006-6101Dec 31, 2006affected < 1.20.13-1.2fixed 1.20.13-1.2
Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph manage
Page 5 of 5