DSA-3224-1 libx11 -- security update

Related Vulnerabilities: CVE-2013-7439  

Abhishek Arya discovered a buffer overflow in the MakeBigReq macro provided by libx11, which could result in denial of service or the execution of arbitrary code. Several other xorg packages (e.g. libxrender) will be recompiled against the fixed package after the release of this update. For detailed information on the status of recompiled packages please refer to the Debian Security Tracker at https://security-tracker.debian.org/tracker/CVE-2013-7439. For the stable distribution (wheezy), this problem has been fixed in version 2:1.5.0-1+deb7u2. For the upcoming stable distribution (jessie), this problem has been fixed in version 2:1.6.0-1. For the unstable distribution (sid), this problem has been fixed in version 2:1.6.0-1. We recommend that you upgrade your libx11 packages.

Debian Security Advisory

DSA-3224-1 libx11 -- security update

Date Reported:
12 Apr 2015
Affected Packages:
libx11
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2013-7439.
More information:

Abhishek Arya discovered a buffer overflow in the MakeBigReq macro provided by libx11, which could result in denial of service or the execution of arbitrary code.

Several other xorg packages (e.g. libxrender) will be recompiled against the fixed package after the release of this update. For detailed information on the status of recompiled packages please refer to the Debian Security Tracker at https://security-tracker.debian.org/tracker/CVE-2013-7439.

For the stable distribution (wheezy), this problem has been fixed in version 2:1.5.0-1+deb7u2.

For the upcoming stable distribution (jessie), this problem has been fixed in version 2:1.6.0-1.

For the unstable distribution (sid), this problem has been fixed in version 2:1.6.0-1.

We recommend that you upgrade your libx11 packages.