{"id":"MGASA-2013-0190","summary":"Updated mesa packages fix multiple vulnerabilties","details":"An out-of-bounds access flaw was found in Mesa. If an application using\nMesa exposed the Mesa API to untrusted inputs (Mozilla Firefox does\nthis), an attacker could cause the application to crash or, potentially,\nexecute arbitrary code with the privileges of the user running the\napplication (CVE-2013-1872).\n\nIt was found that Mesa did not correctly validate messages from the X\nserver. A malicious X server could cause an application using Mesa to\ncrash or, potentially, execute arbitrary code with the privileges of the\nuser running the application (CVE-2013-1993).\n","modified":"2026-01-30T14:14:54.287411Z","published":"2013-06-26T19:04:19Z","related":["CVE-2013-1872","CVE-2013-1993"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0190.html"},{"type":"REPORT","url":"http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"},{"type":"REPORT","url":"https://rhn.redhat.com/errata/RHSA-2013-0897.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=10569"}],"affected":[{"package":{"name":"mesa","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/mesa?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.5-1.1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0190.json"}},{"package":{"name":"mesa","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/mesa?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.5-1.1.mga2.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0190.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}