Integer overflow in X.org libxcb 1.9 and previous versions allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 7.0 |
||
debian debian linux 6.0 |
||
oracle secure global desktop 4.71 |
||
oracle secure global desktop 5.2 |
||
canonical ubuntu linux 13.04 |
||
canonical ubuntu linux 10.04 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 12.10 |
||
opensuse opensuse 12.3 |
||
opensuse opensuse 12.2 |
||
fedoraproject fedora 19 |
||
x libxcb |
||
x libxcb 1.8.1 |
||
x libxcb 1.8 |
||
x libxcb 1.1.93 |
||
x libxcb 1.1.92 |
||
x libxcb 1.5 |
||
x libxcb 1.4 |
||
x libxcb 1.3 |
||
x libxcb 1.2 |
||
x libxcb 1.7 |
||
x libxcb 1.6 |
||
x libxcb 1.1.90.1 |
||
x libxcb 1.1.91 |