1
PublicDateAtUSN: 2013-05-23 15:00:00 UTC
2
Candidate: CVE-2013-2064
3
CRD: 2013-05-23 15:00:00 UTC
6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064
7
http://www.x.org/wiki/Development/Security/Advisory-2013-05-23
8
http://www.debian.org/security/2013/dsa-2686
9
https://usn.ubuntu.com/usn/usn-1855-1
11
Integer overflow in X.org libxcb 1.9 and earlier allows X servers to
12
trigger allocation of insufficient memory and a buffer overflow via vectors
13
related to the read_packet function.
18
Discovered-by: Ilja van Sprundel
22
upstream: http://cgit.freedesktop.org/xcb/libxcb/commit/?id=1b33867fa996034deb50819ae54640be501f8d20 (1/1)
23
upstream_libxcb: pending (1.8.1-2+deb7u1,1.9.1)
24
lucid_libxcb: released (1.5-2ubuntu0.1)
25
precise_libxcb: released (1.8.1-1ubuntu0.2)
26
quantal_libxcb: released (1.8.1-1ubuntu1.1)
27
raring_libxcb: released (1.8.1-2ubuntu2.1)
28
devel_libxcb: released (1.8.1-2ubuntu3)