CVE-2013-1993
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
15/06/2013
Last modified:
11/04/2025
Description
Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mesa3d:mesa:*:*:*:*:*:*:*:* | 9.1.1 (including) | |
cpe:2.3:a:mesa3d:mesa:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mesa3d:mesa:9.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mesa3d:mesa:9.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mesa3d:mesa:9.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mesa3d:mesa:9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:x:libglx:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2013-0190.html
- http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html
- http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html
- http://rhn.redhat.com/errata/RHSA-2013-0897.html
- http://rhn.redhat.com/errata/RHSA-2013-0898.html
- http://www.debian.org/security/2013/dsa-2678
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A181
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.ubuntu.com/usn/USN-1888-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
- http://advisories.mageia.org/MGASA-2013-0190.html
- http://lists.freedesktop.org/archives/mesa-dev/2013-May/039720.html
- http://lists.freedesktop.org/archives/mesa-dev/2013-May/039722.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00007.html
- http://rhn.redhat.com/errata/RHSA-2013-0897.html
- http://rhn.redhat.com/errata/RHSA-2013-0898.html
- http://www.debian.org/security/2013/dsa-2678
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A181
- http://www.openwall.com/lists/oss-security/2013/05/23/3
- http://www.ubuntu.com/usn/USN-1888-1
- http://www.x.org/wiki/Development/Security/Advisory-2013-05-23