[SECURITY] [DLA 667-1] libxv security update

Type debian
Reporter Debian
Modified 2016-10-19T10:07:37


Package : libxv Version : 2:1.0.7-1+deb7u2 CVE ID : CVE-2016-5407 Debian Bug : 840438

Tobias Stoeckmann from the OpenBSD project has discovered a number of issues in the way various X client libraries handle the responses they receive from servers. Insufficient validation of data from the X server can cause out of boundary memory and memory corruption in the libxv library.

For Debian 7 "Wheezy", these problems have been fixed in version 2:1.0.7-1+deb7u2.

We recommend that you upgrade your libxv packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS