openSUSE Security Update: Security update for libXtst ______________________________________________________________________________
Announcement ID: openSUSE-SU-2016:3037-1 Rating: moderate References: #1003012 Cross-References: CVE-2016-7951 CVE-2016-7952 Affected Products: openSUSE 13.2 ______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update of libXtst fixes the following security issue:
- malicious data sent from an untrusted or compromised X server could cause out of boundary memory access or endless loops (Denial of Service). (boo#1003012, CVE-2016-7951, CVE-2016-7952)
Patch Instructions:
To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product:
- openSUSE 13.2:
zypper in -t patch openSUSE-2016-1422=1
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 13.2 (i586 x86_64):
libXtst-debugsource-1.2.2-4.3.1 libXtst-devel-1.2.2-4.3.1 libXtst6-1.2.2-4.3.1 libXtst6-debuginfo-1.2.2-4.3.1
- openSUSE 13.2 (x86_64):
libXtst-devel-32bit-1.2.2-4.3.1 libXtst6-32bit-1.2.2-4.3.1 libXtst6-debuginfo-32bit-1.2.2-4.3.1
References:
https://www.suse.com/security/cve/CVE-2016-7951.html https://www.suse.com/security/cve/CVE-2016-7952.html https://bugzilla.suse.com/1003012