-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2312-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort August 04, 2020 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : libx11 Version : 2:1.6.4-3+deb9u2 CVE ID : CVE-2020-14344 Todd Carson discovered some integer overflows in libX11, which could lead to heap corruption when processing crafted messages from an input method. For Debian 9 stretch, this problem has been fixed in version 2:1.6.4-3+deb9u2. We recommend that you upgrade your libx11 packages. For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAl8pE0cACgkQnUbEiOQ2 gwL+yxAAwbCYdXcrFKpXF3OU5pNaXaWEyVPRenKg8U9607pBp3fwx7XnPVffyZwy PobB9BZgEi16XaUTxx4lUUuJuZmw8VLJwSZ74ebVqiNnDE/svnPc5JHT+h0Ejtra lUPJN0xHtMuXVS75EobLTZiimBeE7PrEpYwKXFotgGVjhcpaScI8clK85lBkQUQ3 /bArhAnJ4bmbcTavjUz2mK6b+rHMjilzaBbuR0puQ3fx/9jnnJyQTirQavIWVDAK CJFEvFA55PGmEZNun87Z1uQf7ptfK0eA9Jf83pk3DszSaoyrdsjuKF8AiZIBcVMf Rp2aDqmPuLZN7bxlh8gDDDpm6oXO5F+UUj3shunJKjMma3mmHmR3b5MfXDAsba/J AkPzSC1syxGA/8jQ+eVEsVqaZ1LnREwxLICzF/AfEIwZVP5Sg/D6C5yv9PTcHjbg 5NI16qzTWBJniBh3qmP9tpOFEBDlRAjW7CrXvFIuWFX2D3V71zCximdmmvNoIbIn ZASGzx4aWJXd779pAnc/2pv/NdrRiiDJojXAPrqjmztHsDt73ww8TbNgWMw0Dc7B lSgTNzcfCVE6Wie1oh0BpK3q4KRy2KzeQjmHfRLt5SjF0ONwaZgPSwxl85DKclUl X1D/ED4wxt/XS5foVIddO7w6GnqJBqOc46Qvkx3/SFZrMk9QBk4= =Y2ZK -----END PGP SIGNATURE-----
