~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2013-2063

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2013-05-23 15:00:00 UTC
2
 
Candidate: CVE-2013-2063
3
 
CRD: 2013-05-23 15:00:00 UTC
4
 
PublicDate: 2013-06-15
5
 
References: 
6
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063
7
 
 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
 
 http://www.debian.org/security/2013/dsa-2689
9
 
 https://usn.ubuntu.com/usn/usn-1866-1
10
 
Description:
11
 
 Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to
12
 
 trigger allocation of insufficient memory and a buffer overflow via vectors
13
 
 related to the XRecordGetContext function.
14
 
Ubuntu-Description: 
15
 
Notes: 
16
 
Bugs: 
17
 
Priority: medium
18
 
Discovered-by: Ilja van Sprundel
19
 
Assigned-to: mdeslaur
20
 
 
21
 
Patches_libxtst:
22
 
 upstream: http://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=46ed6283034b5b7d14584009453f5d974cfacf1e
23
 
 upstream: http://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=e7e04b7be3f018ad636aba3a36bfc1cd80b9906d (1/1)
24
 
upstream_libxtst: needed
25
 
lucid_libxtst: released (2:1.1.0-2ubuntu0.1)
26
 
precise_libxtst: released (2:1.2.0-4ubuntu0.1)
27
 
quantal_libxtst: released (2:1.2.1-1ubuntu0.12.10.1)
28
 
raring_libxtst: released (2:1.2.1-1ubuntu0.13.04.1)
29
 
devel_libxtst: not-affected (2:1.2.1-1+deb7u1)