{"id":"CVE-2016-5407","details":"The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.","modified":"2026-04-16T01:39:07.841936111Z","published":"2016-12-13T20:59:01.923Z","related":["SUSE-SU-2016:2505-1","SUSE-SU-2016:2828-1","SUSE-SU-2016:3110-1","openSUSE-SU-2024:10274-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"24"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"25"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3IA7BLB4C3JOYVU6UASGUJQJKUF6TO7E/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AE2VJOFA3EZA566RERQB54TFY56FROZR/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/04/2"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/04/4"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93368"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036945"},{"type":"ADVISORY","url":"https://lists.x.org/archives/xorg-announce/2016-October/002720.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201704-03"},{"type":"FIX","url":"https://cgit.freedesktop.org/xorg/lib/libXv/commit/?id=d9da580b46a28ab497de2e94fdc7b9ff953dab17"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libXv","events":[{"introduced":"0"},{"last_affected":"736d7ac5a94c7aa6761d50ab58339a3d9a116c51"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.0.10"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:x.org:libxv:*:*:*:*:*:*:*:*"}}],"versions":["MODULAR_COPY","XACE-SELINUX-MERGE","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_1","XORG-6_8_1_901","XORG-6_8_1_902","XORG-6_8_1_903","XORG-6_8_1_904","XORG-6_8_2","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","lg3d-base","lg3d-rel-0-6-2","lg3d-rel-0-7-0","libXv-1.0.10","libXv-1.0.2","libXv-1.0.3","libXv-1.0.4","libXv-1.0.5","libXv-1.0.6","libXv-1.0.7","libXv-1.0.8","libXv-1.0.9","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5407.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}