CVE-2013-1992

Publication date 23 May 2013

Last updated 24 July 2024


Ubuntu priority

Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.

Status

Package Ubuntu Release Status
libdmx 13.04 raring
Fixed 1:1.1.2-1ubuntu0.13.04.1
12.10 quantal
Fixed 1:1.1.2-1ubuntu0.12.10.1
12.04 LTS precise
Fixed 1:1.1.1-1ubuntu0.1
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libdmx