Debian Security Advisory

DLA-667-1 libxv -- LTS security update

Date Reported:
19 Oct 2016
Affected Packages:
libxv
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 840438.
In Mitre's CVE dictionary: CVE-2016-5407.
More information:

Tobias Stoeckmann from the OpenBSD project has discovered a number of issues in the way various X client libraries handle the responses they receive from servers. Insufficient validation of data from the X server can cause out of boundary memory and memory corruption in the libxv library.

For Debian 7 Wheezy, these problems have been fixed in version 2:1.0.7-1+deb7u2.

We recommend that you upgrade your libxv packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS