CVE-2013-1992
Publication date 23 May 2013
Last updated 24 July 2024
Ubuntu priority
Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
Status
Package | Ubuntu Release | Status |
---|---|---|
libdmx | 13.04 raring |
Fixed 1:1.1.2-1ubuntu0.13.04.1
|
12.10 quantal |
Fixed 1:1.1.2-1ubuntu0.12.10.1
|
|
12.04 LTS precise |
Fixed 1:1.1.1-1ubuntu0.1
|
|
10.04 LTS lucid | Ignored end of life |
Patch details
Package | Patch details |
---|---|
libdmx |
References
Related Ubuntu Security Notices (USN)
- USN-1852-1
- libdmx vulnerability
- 5 June 2013