Lucene search

K
debianDebianDEBIAN:DLA-199-1:11DFB
HistoryApr 14, 2015 - 7:51 p.m.

[SECURITY] [DLA 199-1] libx11 security update

2015-04-1419:51:16
lists.debian.org
16

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.7 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.1%

Package : libx11
Version : 2:1.3.3-4+squeeze2
CVE ID : CVE-2013-7439

Abhishek Arya discovered a buffer overflow in the MakeBigReq macro
provided by libx11, which could result in denial of service or the
execution of arbitrary code.

Several other xorg packages (e.g. libxrender) will be recompiled against
the fixed package after the release of this update. For detailed
information on the status of recompiled packages please refer to the
Debian Security Tracker at
https://security-tracker.debian.org/tracker/CVE-2013-7439

For the oldstable distribution (squeeze), this problem has been fixed
in version 2:1.3.3-4+squeeze2.

For the stable distribution (wheezy), this problem has been fixed in
version 2:1.5.0-1+deb7u2.

–
RaphaΓ«l Hertzog β—ˆ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.7 High

AI Score

Confidence

High

0.013 Low

EPSS

Percentile

86.1%