Debian Security Advisory
DLA-667-1 libxv -- LTS security update
- Date Reported:
- 19 Oct 2016
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 840438.
In Mitre's CVE dictionary: CVE-2016-5407.
- More information:
Tobias Stoeckmann from the OpenBSD project has discovered a number of issues in the way various X client libraries handle the responses they receive from servers. Insufficient validation of data from the X server can cause out of boundary memory and memory corruption in the libxv library.
For Debian 7
Wheezy, these problems have been fixed in version 2:1.0.7-1+deb7u2.
We recommend that you upgrade your libxv packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS