First published: Tue Dec 13 2016(Updated: )
X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =24 | |
Fedora | =25 | |
libXtst | <=1.2.2 |
https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7952 has a moderate severity level as it can lead to a denial of service due to an infinite loop.
To fix CVE-2016-7952, upgrade the X.org libXtst package to version 1.2.3 or later.
CVE-2016-7952 affects Fedora versions 24 and 25 as well as X.org libXtst versions prior to 1.2.3.
CVE-2016-7952 can be exploited by remote X servers to trigger a denial of service.
No, CVE-2016-7952 can potentially be exploited over a network, allowing remote attackers to cause service interruptions.