Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:41630
[Eng]
Version
3
Class
vulnerability
ALTXid
211850
Language
Russian
Severity
NotAvailable
Title
Debian -- уязвимость в mesa (CVE-2013-1993)
Description
В продукте mesa обнаружена уязвимость CVE-2013-1993.
Family
unix
Platform
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Debian GNU/Linux 6.0
Debian GNU/Linux 7
Product
mesa
Reference
FSTEC: BDU:2015-09727
FSTEC: BDU:2015-09727
Id:
BDU:2015-09727
Reference:
https://bdu.fstec.ru/vul/2015-09727
FSTEC: BDU:2015-09021
FSTEC: BDU:2015-09021
Id:
BDU:2015-09021
Reference:
https://bdu.fstec.ru/vul/2015-09021
FSTEC: BDU:2015-09020
FSTEC: BDU:2015-09020
Id:
BDU:2015-09020
Reference:
https://bdu.fstec.ru/vul/2015-09020
FSTEC: BDU:2015-09019
FSTEC: BDU:2015-09019
Id:
BDU:2015-09019
Reference:
https://bdu.fstec.ru/vul/2015-09019
FSTEC: BDU:2015-09018
FSTEC: BDU:2015-09018
Id:
BDU:2015-09018
Reference:
https://bdu.fstec.ru/vul/2015-09018
FSTEC: BDU:2015-09017
FSTEC: BDU:2015-09017
Id:
BDU:2015-09017
Reference:
https://bdu.fstec.ru/vul/2015-09017
FSTEC: BDU:2015-09016
FSTEC: BDU:2015-09016
Id:
BDU:2015-09016
Reference:
https://bdu.fstec.ru/vul/2015-09016
FSTEC: BDU:2015-09015
FSTEC: BDU:2015-09015
Id:
BDU:2015-09015
Reference:
https://bdu.fstec.ru/vul/2015-09015
FSTEC: BDU:2015-09014
FSTEC: BDU:2015-09014
Id:
BDU:2015-09014
Reference:
https://bdu.fstec.ru/vul/2015-09014
FSTEC: BDU:2015-09013
FSTEC: BDU:2015-09013
Id:
BDU:2015-09013
Reference:
https://bdu.fstec.ru/vul/2015-09013
FSTEC: BDU:2015-09012
FSTEC: BDU:2015-09012
Id:
BDU:2015-09012
Reference:
https://bdu.fstec.ru/vul/2015-09012
FSTEC: BDU:2015-09011
FSTEC: BDU:2015-09011
Id:
BDU:2015-09011
Reference:
https://bdu.fstec.ru/vul/2015-09011
FSTEC: BDU:2015-09003
FSTEC: BDU:2015-09003
Id:
BDU:2015-09003
Reference:
https://bdu.fstec.ru/vul/2015-09003
FSTEC: BDU:2015-09002
FSTEC: BDU:2015-09002
Id:
BDU:2015-09002
Reference:
https://bdu.fstec.ru/vul/2015-09002
FSTEC: BDU:2015-09001
FSTEC: BDU:2015-09001
Id:
BDU:2015-09001
Reference:
https://bdu.fstec.ru/vul/2015-09001
FSTEC: BDU:2015-09000
FSTEC: BDU:2015-09000
Id:
BDU:2015-09000
Reference:
https://bdu.fstec.ru/vul/2015-09000
FSTEC: BDU:2015-08999
FSTEC: BDU:2015-08999
Id:
BDU:2015-08999
Reference:
https://bdu.fstec.ru/vul/2015-08999
FSTEC: BDU:2015-08998
FSTEC: BDU:2015-08998
Id:
BDU:2015-08998
Reference:
https://bdu.fstec.ru/vul/2015-08998
FSTEC: BDU:2015-08997
FSTEC: BDU:2015-08997
Id:
BDU:2015-08997
Reference:
https://bdu.fstec.ru/vul/2015-08997
FSTEC: BDU:2015-08996
FSTEC: BDU:2015-08996
Id:
BDU:2015-08996
Reference:
https://bdu.fstec.ru/vul/2015-08996
FSTEC: BDU:2015-08995
FSTEC: BDU:2015-08995
Id:
BDU:2015-08995
Reference:
https://bdu.fstec.ru/vul/2015-08995
FSTEC: BDU:2015-08994
FSTEC: BDU:2015-08994
Id:
BDU:2015-08994
Reference:
https://bdu.fstec.ru/vul/2015-08994
FSTEC: BDU:2015-07431
FSTEC: BDU:2015-07431
Id:
BDU:2015-07431
Reference:
https://bdu.fstec.ru/vul/2015-07431
FSTEC: BDU:2015-07430
FSTEC: BDU:2015-07430
Id:
BDU:2015-07430
Reference:
https://bdu.fstec.ru/vul/2015-07430
FSTEC: BDU:2015-07429
FSTEC: BDU:2015-07429
Id:
BDU:2015-07429
Reference:
https://bdu.fstec.ru/vul/2015-07429
FSTEC: BDU:2015-07428
FSTEC: BDU:2015-07428
Id:
BDU:2015-07428
Reference:
https://bdu.fstec.ru/vul/2015-07428
FSTEC: BDU:2015-07427
FSTEC: BDU:2015-07427
Id:
BDU:2015-07427
Reference:
https://bdu.fstec.ru/vul/2015-07427
FSTEC: BDU:2015-07426
FSTEC: BDU:2015-07426
Id:
BDU:2015-07426
Reference:
https://bdu.fstec.ru/vul/2015-07426
FSTEC: BDU:2015-07425
FSTEC: BDU:2015-07425
Id:
BDU:2015-07425
Reference:
https://bdu.fstec.ru/vul/2015-07425
FSTEC: BDU:2015-07424
FSTEC: BDU:2015-07424
Id:
BDU:2015-07424
Reference:
https://bdu.fstec.ru/vul/2015-07424
FSTEC: BDU:2015-07423
FSTEC: BDU:2015-07423
Id:
BDU:2015-07423
Reference:
https://bdu.fstec.ru/vul/2015-07423
FSTEC: BDU:2015-07422
FSTEC: BDU:2015-07422
Id:
BDU:2015-07422
Reference:
https://bdu.fstec.ru/vul/2015-07422
FSTEC: BDU:2015-07421
FSTEC: BDU:2015-07421
Id:
BDU:2015-07421
Reference:
https://bdu.fstec.ru/vul/2015-07421
FSTEC: BDU:2015-07420
FSTEC: BDU:2015-07420
Id:
BDU:2015-07420
Reference:
https://bdu.fstec.ru/vul/2015-07420
FSTEC: BDU:2015-07232
FSTEC: BDU:2015-07232
Id:
BDU:2015-07232
Reference:
https://bdu.fstec.ru/vul/2015-07232
FSTEC: BDU:2015-06427
FSTEC: BDU:2015-06427
Id:
BDU:2015-06427
Reference:
https://bdu.fstec.ru/vul/2015-06427
FSTEC: BDU:2015-06426
FSTEC: BDU:2015-06426
Id:
BDU:2015-06426
Reference:
https://bdu.fstec.ru/vul/2015-06426
FSTEC: BDU:2015-06425
FSTEC: BDU:2015-06425
Id:
BDU:2015-06425
Reference:
https://bdu.fstec.ru/vul/2015-06425
FSTEC: BDU:2015-06424
FSTEC: BDU:2015-06424
Id:
BDU:2015-06424
Reference:
https://bdu.fstec.ru/vul/2015-06424
FSTEC: BDU:2015-06423
FSTEC: BDU:2015-06423
Id:
BDU:2015-06423
Reference:
https://bdu.fstec.ru/vul/2015-06423
FSTEC: BDU:2015-06422
FSTEC: BDU:2015-06422
Id:
BDU:2015-06422
Reference:
https://bdu.fstec.ru/vul/2015-06422
FSTEC: BDU:2015-06421
FSTEC: BDU:2015-06421
Id:
BDU:2015-06421
Reference:
https://bdu.fstec.ru/vul/2015-06421
FSTEC: BDU:2015-06420
FSTEC: BDU:2015-06420
Id:
BDU:2015-06420
Reference:
https://bdu.fstec.ru/vul/2015-06420
FSTEC: BDU:2015-06419
FSTEC: BDU:2015-06419
Id:
BDU:2015-06419
Reference:
https://bdu.fstec.ru/vul/2015-06419
FSTEC: BDU:2015-06418
FSTEC: BDU:2015-06418
Id:
BDU:2015-06418
Reference:
https://bdu.fstec.ru/vul/2015-06418
FSTEC: BDU:2015-06201
FSTEC: BDU:2015-06201
Id:
BDU:2015-06201
Reference:
https://bdu.fstec.ru/vul/2015-06201
CVE: CVE-2013-1993
CVE: CVE-2013-1993
Id:
CVE-2013-1993
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993
Comment
: Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
CWE:
189 (Numeric Errors)
References:
[oss-security] 20130523 Fwd: [ANNOUNCE] X.Org Security Advisory: Protocol handling issues in X Window System client libraries (MLIST)
http://www.x.org/wiki/Development/Security/Advisory-2013-05-23 (CONFIRM)
DSA-2678 (DEBIAN)
openSUSE-SU-2013:0865 (SUSE)
RHSA-2013:0898 (REDHAT)
RHSA-2013:0897 (REDHAT)
USN-1888-1 (UBUNTU)
http://advisories.mageia.org/MGASA-2013-0190.html (CONFIRM)
[Mesa-dev] 20130523 [PATCH:mesa 1/2] integer overflow in XF86DRIOpenConnection() [CVE-2013-1993 1/2] (MLIST)
[Mesa-dev] 20130523 [PATCH:mesa 2/2] integer overflow in XF86DRIGetClientDriverName() [CVE-2013-1993 2/2] (MLIST)
MDVSA-2013:181 (MANDRIVA)
VENDOR: DSA-2678-1
VENDOR: DSA-2678-1
Id:
DSA-2678-1
Reference:
http://www.debian.org/security/dsa-2678-1
Content available only for registered users!
ovaldb@altx-soft.com