Description
This update for the X Window System client libraries fixes a class of
privilege escalation issues.
A malicious X Server could send specially crafted data to X clients, which
allowed for triggering crashes, or privilege escalation if this
relationship was untrusted or crossed user or permission level boundaries.
libX11, libXfixes, libXi, libXrandr, libXrender, libXtst, libXv, libXvMC
were fixed, specifically:
libX11:
- CVE-2016-7942: insufficient validation of data from the X server allowed
out of boundary memory read (bsc#1002991)
libXfixes:
- CVE-2016-7944: insufficient validation of data from the X server can
cause an integer overflow on 32 bit architectures (bsc#1002995)
libXi:
- CVE-2016-7945, CVE-2016-7946: insufficient validation of data from the X
server can cause out of boundary memory access or endless loops (Denial
of Service) (bsc#1002998)
libXtst:
- CVE-2016-7951, CVE-2016-7952: insufficient validation of data from the X
server can cause out of boundary memory access or endless loops (Denial
of Service) (bsc#1003012)
libXv:
- CVE-2016-5407: insufficient validation of data from the X server can
cause out of boundary memory and memory corruption (bsc#1003017)
libXvMC:
- CVE-2016-7953: insufficient validation of data from the X server can
cause a one byte buffer read underrun (bsc#1003023)
libXrender:
- CVE-2016-7949, CVE-2016-7950: insufficient validation of data from the X
server can cause out of boundary memory writes (bsc#1003002)
libXrandr: - CVE-2016-7947, CVE-2016-7948: insufficient validation of data from the X server can cause out of boundary memory writes (bsc#1003000)