The following updates has been released for Debian:
[DLA 654-1] libxfixes security update
[DSA 3693-1] libgd2 security update
[DLA 654-1] libxfixes security update
[DSA 3693-1] libgd2 security update
[DLA 654-1] libxfixes security update
Package : libxfixes
Version : 1:5.0-4+deb7u2
CVE ID : CVE-2016-7944
Debian Bug : 840442
It was discovered that there was a integer overflow in libxfixes, a library
providing a client interface to the X11 'XFIXES' extension.
The 32 bit field "rep.length" was not checked for validity, which allowed an
integer overflow on 32 bit systems. A malicious server could send INT_MAX as
"length" which was then multiplied by the size of XRectangle. In this case the
client would not read the whole data from server, getting out of sync.
For Debian 7 "Wheezy", this issue has been fixed in libxfixes version
1:5.0-4+deb7u2.
We recommend that you upgrade your libxfixes packages.
[DSA 3693-1] libgd2 security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3693-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 14, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libgd2
CVE ID : CVE-2016-7568
Multiple vulnerabilities have been discovered in the GD Graphics Library,
which may result in denial of service or potentially the execution of
arbitrary code if a malformed file is processed.
For the stable distribution (jessie), this problem has been fixed in
version 2.1.0-5+deb8u7.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your libgd2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/