-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2666-1 [email protected] https://www.debian.org/lts/security/ Emilio Pozuelo Monfort May 24, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : libx11 Version : 2:1.6.4-3+deb9u4 CVE ID : CVE-2021-31535 Debian Bug : 988737 Roman Fiedler found that libX11, the X11 protocol client library, was vulnerable to protocol command injection due to insufficient validation of arguments to some functions. For Debian 9 stretch, this problem has been fixed in version 2:1.6.4-3+deb9u4. We recommend that you upgrade your libx11 packages. For the detailed security status of libx11 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libx11 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmCrTzgACgkQnUbEiOQ2 gwLqqhAAlzy7s8OEiLd84BypiT1j8fOHSFM3INgOaGW1Bt7OMEFCFlHz+evVCIAW fuwz8eQJlDIAtDBbGiIwQ+zsHSzeYydYVSaaN7o07jLkFLo8xKdqe8xnAJQ81E+m gGMC1d0etSOd9SEZ1uNU1iaIaqVQwY8OzMsyt4zipOSLjyzsW/xVM3vGUqV/bJ+s MnjnG1Ffjyjm09pb4mtM2V1bG8v56iBrFGhOTg3St+TI+O4aWt/WhqyiRdBttiOy S+igtBYEJ1SOpePpdS++Q7jKAszrFpFG3Kh6uAo+WeIAAypVgXz3hszg8AzTSrfb nkNbEw+Eqx71N7dkO1Qn8CNiplyIz0AqiUznIxwDSy4XJjTCWVkum2Vu9ndZ9vcf 32ACA+4Lr4rL741PUviKtLroC+9LKBe+UAE65AycMrUlkodWaL9piV7HiC+o7JFg bIeJNd+J6QNDZigp7+jfTsSr8tjwzqFkI9rOTZvYYE4THwJ7Bxys0l9J9JDMOt8D 9Irt74HSfA7KIohFSvTja13WOKY+2hcwxtabYnpRTZ6liFE0amGYJy6luxcO3dZq QSojino7hl5SbLnn5S67OPD6yaNz+EfT38bAVTm/t0l1tf3jvxvu5QQOm5QH2zfJ 3bTfdr/FOu0DFOUWR1EUXP0My+f19MxoolgHgIedxCG2yNZUvjk= =/oPn -----END PGP SIGNATURE-----
