Debian Security Advisory DSA 2676-1 (libxfixes - several vulnerabilities)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input sanitising may lead to privilege escalation or denial of service.
Affected Software
Affected Software
libxfixes on Debian Linux
Detection Method
Detection Method
This check tests the installed software version using the apt package manager.
Solution
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 1:4.0.5-1+squeeze1. For the stable distribution (wheezy), this problem has been fixed in version 1:5.0-4+deb7u1. For the unstable distribution (sid), this problem has been fixed in version 1:5.0-4+deb7u1. We recommend that you upgrade your libxfixes packages.
Common Vulnerabilities and Exposures (CVE)
Scan your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.
Get Started for Free