[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 684-1] libx11 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : libx11
Version        : 2:1.5.0-1+deb7u3
CVE ID         : CVE-2016-7942 CVE-2016-7943
Debian Bug     : 840439

Tobias Stoeckmann from the OpenBSD project discovered the following
vulnerability in libX11, the X11 client-side library:

    Insufficient validation of data from the X server
    can cause out of boundary memory read (XGetImage())
    or write (XListFonts()).

For Debian 7 "Wheezy", these problems have been fixed in version
2:1.5.0-1+deb7u3.

We recommend that you upgrade your libx11 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=3qqn
-----END PGP SIGNATURE-----


Reply to: