CVE-2013-2064
15.06.2013, 19:55
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.Enginsight
| Vendor | Product | Version |
|---|---|---|
| debian | debian_linux | 6.0 |
| debian | debian_linux | 7.0 |
| oracle | secure_global_desktop | 4.71 |
| oracle | secure_global_desktop | 5.2 |
| canonical | ubuntu_linux | 10.04 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 12.10 |
| canonical | ubuntu_linux | 13.04 |
| opensuse | opensuse | 12.2 |
| opensuse | opensuse | 12.3 |
| x | libxcb | 𝑥 ≤ 1.9 |
| x | libxcb | 1.1.90.1 |
| x | libxcb | 1.1.91 |
| x | libxcb | 1.1.92 |
| x | libxcb | 1.1.93 |
| x | libxcb | 1.2 |
| x | libxcb | 1.3 |
| x | libxcb | 1.4 |
| x | libxcb | 1.5 |
| x | libxcb | 1.6 |
| x | libxcb | 1.7 |
| x | libxcb | 1.8 |
| x | libxcb | 1.8.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References