Bug 1618240 (CVE-2006-6103) - CVE-2006-6103 security flaw
Summary: CVE-2006-6103 security flaw
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2006-6103
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-08-16 12:45 UTC by Stephen Herr
Modified: 2019-09-29 14:56 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2018-08-16 12:45:30 UTC


Attachments (Terms of Use)

Description Stephen Herr 2018-08-16 12:45:24 UTC
Flaw bug created to hold information about an old flaw we knew something about. For more details see the MITRE CVE description.

Comment 1 Stephen Herr 2018-08-16 16:52:05 UTC
MITRE description:

Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.

Comment 2 Stephen Herr 2019-06-13 19:31:13 UTC
Statement:

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.


Note You need to log in before you can comment on or make changes to this bug.