1
PublicDateAtUSN: 2013-05-23 15:00:00 UTC
2
Candidate: CVE-2013-2063
3
CRD: 2013-05-23 15:00:00 UTC
6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
7
http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
http://www.debian.org/security/2013/dsa-2689
9
https://usn.ubuntu.com/usn/usn-1866-1
11
Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to
12
trigger allocation of insufficient memory and a buffer overflow via vectors
13
related to the XRecordGetContext function.
18
Discovered-by: Ilja van Sprundel
22
upstream: http://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=46ed6283034b5b7d14584009453f5d974cfacf1e
23
upstream: http://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=e7e04b7be3f018ad636aba3a36bfc1cd80b9906d (1/1)
24
upstream_libxtst: needed
25
lucid_libxtst: released (2:1.1.0-2ubuntu0.1)
26
precise_libxtst: released (2:1.2.0-4ubuntu0.1)
27
quantal_libxtst: released (2:1.2.1-1ubuntu0.12.10.1)
28
raring_libxtst: released (2:1.2.1-1ubuntu0.13.04.1)
29
devel_libxtst: not-affected (2:1.2.1-1+deb7u1)