LibXcursor: User-assisted execution of arbitrary code A vulnerability in LibXcursor might allow remote attackers to execute arbitrary code. LibXcursor 2018-01-07 2018-01-07 639062 local, remote 1.1.15 1.1.15

X.Org X11 libXcursor runtime library.

It was discovered that libXcursor is prone to several heap overflows when parsing malicious files.

A remote attacker, by enticing a user to process a specially crafted cursor file, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

There is no known workaround at this time.

All LibXcursor users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=x11-libs/libXcursor-1.1.15"
CVE-2017-16612 jmbailey jmbailey