CVE-2013-2064
15.06.2013, 19:55
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 6.0 |
debian | debian_linux | 7.0 |
oracle | secure_global_desktop | 4.71 |
oracle | secure_global_desktop | 5.2 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 12.10 |
canonical | ubuntu_linux | 13.04 |
opensuse | opensuse | 12.2 |
opensuse | opensuse | 12.3 |
x | libxcb | 𝑥 ≤ 1.9 |
x | libxcb | 1.1.90.1 |
x | libxcb | 1.1.91 |
x | libxcb | 1.1.92 |
x | libxcb | 1.1.93 |
x | libxcb | 1.2 |
x | libxcb | 1.3 |
x | libxcb | 1.4 |
x | libxcb | 1.5 |
x | libxcb | 1.6 |
x | libxcb | 1.7 |
x | libxcb | 1.8 |
x | libxcb | 1.8.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References