Integer Overflow or Wraparound Affecting libxcursor package, versions <1:1.1.14-1+deb9u1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Availability High

    Threat Intelligence

    EPSS 0.55% (78th percentile)
Expand this section
NVD
7.5 high
Expand this section
Red Hat
7.8 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN9-LIBXCURSOR-282529
  • published 1 Dec 2017
  • disclosed 1 Dec 2017

How to fix?

Upgrade Debian:9 libxcursor to version 1:1.1.14-1+deb9u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libxcursor package and not the libxcursor package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.