DLA-671-1

Source
https://storage.googleapis.com/debian-osv/dla-osv/DLA-671-1.json
Aliases
  • CVE-2016-7953
Published
2016-10-19T00:00:00Z
Modified
2022-08-05T05:20:32.556254Z
Details
  • CVE-2016-7953 If an empty string is received from an x-server, do not underrun the buffer by accessing "rep.nameLen - 1" unconditionally, which could end up being -1.

For Debian 7 Wheezy, these problems have been fixed in version 2:1.0.7-1+deb7u3.

We recommend that you upgrade your libxvmc packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

References

Affected packages

Debian:7 / libxvmc

libxvmc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
2:1.0.7-1+deb7u3

Affected versions

2:1.*

2:1.0.7-1
2:1.0.7-1+deb7u1
2:1.0.7-1+deb7u2