~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2013-2064

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2013-05-23 15:00:00 UTC
2
 
Candidate: CVE-2013-2064
3
 
CRD: 2013-05-23 15:00:00 UTC
4
 
PublicDate: 2013-06-15
5
 
References: 
6
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064
7
 
 http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
 
 http://www.debian.org/security/2013/dsa-2686
9
 
 https://usn.ubuntu.com/usn/usn-1855-1
10
 
Description:
11
 
 Integer overflow in X.org libxcb 1.9 and earlier allows X servers to
12
 
 trigger allocation of insufficient memory and a buffer overflow via vectors
13
 
 related to the read_packet function.
14
 
Ubuntu-Description: 
15
 
Notes: 
16
 
Bugs: 
17
 
Priority: medium
18
 
Discovered-by: Ilja van Sprundel
19
 
Assigned-to: mdeslaur
20
 
 
21
 
Patches_libxcb:
22
 
 upstream: http://cgit.freedesktop.org/xcb/libxcb/commit/?id=1b33867fa996034deb50819ae54640be501f8d20 (1/1)
23
 
upstream_libxcb: pending (1.8.1-2+deb7u1,1.9.1)
24
 
lucid_libxcb: released (1.5-2ubuntu0.1)
25
 
precise_libxcb: released (1.8.1-1ubuntu0.2)
26
 
quantal_libxcb: released (1.8.1-1ubuntu1.1)
27
 
raring_libxcb: released (1.8.1-2ubuntu2.1)
28
 
devel_libxcb: released (1.8.1-2ubuntu3)