Package : libxv Version : 2:1.0.7-1+deb7u2 CVE ID : CVE-2016-5407 Debian Bug : 840438
Tobias Stoeckmann from the OpenBSD project has discovered a number of issues in the way various X client libraries handle the responses they receive from servers. Insufficient validation of data from the X server can cause out of boundary memory and memory corruption in the libxv library.
For Debian 7 "Wheezy", these problems have been fixed in version 2:1.0.7-1+deb7u2.
We recommend that you upgrade your libxv packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS