MGASA-2013-0190

Source
https://advisories.mageia.org/MGASA-2013-0190.html
Import Source
https://advisories.mageia.org/MGASA-2013-0190.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2013-0190
Related
Published
2013-06-26T19:04:19Z
Modified
2013-06-26T19:04:02Z
Summary
Updated mesa packages fix multiple vulnerabilties
Details

An out-of-bounds access flaw was found in Mesa. If an application using Mesa exposed the Mesa API to untrusted inputs (Mozilla Firefox does this), an attacker could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-1872).

It was found that Mesa did not correctly validate messages from the X server. A malicious X server could cause an application using Mesa to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2013-1993).

References
Credits

Affected packages

Mageia:2 / mesa

Package

Name
mesa
Purl
pkg:rpm/mageia/mesa?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.5-1.1.mga2.tainted

Ecosystem specific

{
    "section": "tainted"
}

Mageia:2 / mesa

Package

Name
mesa
Purl
pkg:rpm/mageia/mesa?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.5-1.1.mga2

Ecosystem specific

{
    "section": "core"
}