| Integer overflow in the ProcDbeSwapBuffers function in the DBE
extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server,
allows local users to execute arbitrary code via a crafted X protocol
request that triggers memory corruption during processing of
unspecified data structures.
|