Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-7nds-rrr4-pke2
Vulnerability ID VCID-7nds-rrr4-pke2
Aliases CVE-2011-0465
Summary This GLSA contains notification of vulnerabilities found in several Gentoo packages which have been fixed prior to January 1, 2012. The worst of these vulnerabilities could lead to local privilege escalation and remote code execution. Please see the package list and CVE identifiers below for more information.
Status Published
Exploitability 0.5
Weighted Severity 8.4
Risk 4.2
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html
http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html
http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0465.json
https://api.first.org/data/v1/epss?cve=CVE-2011-0465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465
http://secunia.com/advisories/44010
http://secunia.com/advisories/44012
http://secunia.com/advisories/44040
http://secunia.com/advisories/44082
http://secunia.com/advisories/44122
http://secunia.com/advisories/44123
http://secunia.com/advisories/44193
https://exchange.xforce.ibmcloud.com/vulnerabilities/66585
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.465748
https://lwn.net/Articles/437150/
http://www.debian.org/security/2011/dsa-2213
http://www.mandriva.com/security/advisories?name=MDVSA-2011:076
http://www.redhat.com/support/errata/RHSA-2011-0432.html
http://www.redhat.com/support/errata/RHSA-2011-0433.html
http://www.securityfocus.com/bid/47189
http://www.securitytracker.com/id?1025317
http://www.ubuntu.com/usn/USN-1107-1
http://www.vupen.com/english/advisories/2011/0880
http://www.vupen.com/english/advisories/2011/0889
http://www.vupen.com/english/advisories/2011/0906
http://www.vupen.com/english/advisories/2011/0929
http://www.vupen.com/english/advisories/2011/0966
http://www.vupen.com/english/advisories/2011/0975
621423 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621423
680196 https://bugzilla.redhat.com/show_bug.cgi?id=680196
cpe:2.3:a:matthias_hopf:xrdb:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:*:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:matthias_hopf:xrdb:1.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_hopf:xrdb:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:*:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r1:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r2:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r3:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r4:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r5:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.1:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.3:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.4:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.6:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.7:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.8.0:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.8.1:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.8.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.8.2:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r6.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r6.9.0:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.0:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.1:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.2:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.3:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.4:*:*:*:*:*:*:*
cpe:2.3:a:x:x11:r7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:x11:r7.5:*:*:*:*:*:*:*
CVE-2011-0465 https://nvd.nist.gov/vuln/detail/CVE-2011-0465
GLSA-201412-09 https://security.gentoo.org/glsa/201412-09
RHSA-2011:0432 https://access.redhat.com/errata/RHSA-2011:0432
RHSA-2011:0433 https://access.redhat.com/errata/RHSA-2011:0433
USN-1107-1 https://usn.ubuntu.com/1107-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2011-0465
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.92978
EPSS Score 0.099
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:59:55.369295+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201412-09 38.0.0