First published: Tue Dec 13 2016(Updated: )
Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =24 | |
Fedora | =25 | |
CentOS Libxrandr | <=1.5.0 |
https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7947 has a severity rating that indicates a significant risk due to potential remote code execution.
To fix CVE-2016-7947, upgrade X.org libXrandr to version 1.5.1 or later.
CVE-2016-7947 affects X.org libXrandr versions up to and including 1.5.0, as well as Fedora versions 24 and 25.
CVE-2016-7947 poses a risk by allowing remote X servers to perform out-of-bounds write operations through crafted responses.
Users and administrators of systems running affected versions of Fedora and X.org libXrandr should be concerned about CVE-2016-7947.