Total vulnerabilities in the database
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 7.0 | 7.0.x |
debian / debian_linux | 6.0 | 6.0.x |
oracle / secure_global_desktop | 5.2 | 5.2.x |
oracle / secure_global_desktop | 4.71 | 4.71.x |
canonical / ubuntu_linux | 13.04 | 13.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 12.10 | 12.10.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
opensuse / opensuse | 12.3 | 12.3.x |
opensuse / opensuse | 12.2 | 12.2.x |
fedoraproject / fedora | 19 | 19.x |
x / libxcb | - | 1.9.x |
x / libxcb | 1.1.90.1 | 1.1.90.1.x |
x / libxcb | 1.1.91 | 1.1.91.x |
x / libxcb | 1.1.92 | 1.1.92.x |
x / libxcb | 1.4 | 1.4.x |
x / libxcb | 1.1.93 | 1.1.93.x |
x / libxcb | 1.5 | 1.5.x |
x / libxcb | 1.2 | 1.2.x |
x / libxcb | 1.3 | 1.3.x |
x / libxcb | 1.7 | 1.7.x |
x / libxcb | 1.8.1 | 1.8.1.x |
x / libxcb | 1.8 | 1.8.x |
x / libxcb | 1.6 | 1.6.x |