ArchLinux: 201711-41: libxcursor: arbitrary code execution
Summary
It was discovered that libxcursor before 1.1.15 is vulnerable to heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments. An attacker could use local privileges or trick a user into parsing a malicious file to cause libxcursor to crash, resulting in a denial of service, or possibly execute arbitrary code.
Resolution
Upgrade to 1.1.15-1.
# pacman -Syu "libxcursor>=1.1.15-1"
The problem has been fixed upstream in version 1.1.15.
References
https://www.openwall.com/lists/oss-security/2017/11/28/6 https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 https://marc.info/?l=freedesktop-xorg-announce&m=151188036018262&w=2 https://security.archlinux.org/CVE-2017-16612
Workaround
None.