-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3224-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 12, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libx11 CVE ID : CVE-2013-7439 Abhishek Arya discovered a buffer overflow in the MakeBigReq macro provided by libx11, which could result in denial of service or the execution of arbitrary code. Several other xorg packages (e.g. libxrender) will be recompiled against the fixed package after the release of this update. For detailed information on the status of recompiled packages please refer to the Debian Security Tracker at https://security-tracker.debian.org/tracker/CVE-2013-7439 For the stable distribution (wheezy), this problem has been fixed in version 2:1.5.0-1+deb7u2. For the upcoming stable distribution (jessie), this problem has been fixed in version 2:1.6.0-1. For the unstable distribution (sid), this problem has been fixed in version 2:1.6.0-1. We recommend that you upgrade your libx11 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org