{"id":"CVE-2016-7946","details":"X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.","modified":"2026-04-01T23:54:47.757605Z","published":"2016-12-13T20:59:11.613Z","related":["MGASA-2018-0011","SUSE-SU-2016:2505-1","SUSE-SU-2016:2828-1","SUSE-SU-2016:3047-1","SUSE-SU-2016:3189-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/10/04/2"},{"type":"WEB","url":"http://www.securityfocus.com/bid/93374"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036945"},{"type":"WEB","url":"https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/"},{"type":"WEB","url":"https://lists.x.org/archives/xorg-announce/2016-October/002720.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/10/04/4"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201704-03"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.freedesktop.org/xorg/lib/libXi","events":[{"introduced":"0"},{"last_affected":"2286282f965064176b3b1492646c6e2e0f4ab7dd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.7.6"}]}}],"versions":["CYGWIN-6_8_0-MERGE","CYGWIN-6_8_1-MERGE","CYGWIN-6_8_2-MERGE","CYGWIN-HEAD-LAST-MERGE","CYGWIN-HEAD-MERGE","CYGWIN-PRE-6_8_0-MERGE","CYGWIN-RELEASE-1-MERGE","DAMAGE-XFIXES-BASE","IPv6-REVIEW-BASE","MODULAR_COPY","PRE_xf86-4_3_0_1","XACE-SELINUX-BASE","XACE-SELINUX-MERGE","XEVIE-BASE","XEVIE-MERGE","XORG-6_7_0","XORG-6_7_99_1","XORG-6_7_99_2","XORG-6_7_99_901","XORG-6_7_99_902","XORG-6_7_99_903","XORG-6_7_99_904","XORG-6_8_0","XORG-6_8_1","XORG-6_8_1_901","XORG-6_8_1_902","XORG-6_8_1_903","XORG-6_8_1_904","XORG-6_8_2","XORG-6_8_99_1","XORG-6_8_99_10","XORG-6_8_99_11","XORG-6_8_99_12","XORG-6_8_99_13","XORG-6_8_99_14","XORG-6_8_99_15","XORG-6_8_99_16","XORG-6_8_99_2","XORG-6_8_99_3","XORG-6_8_99_4","XORG-6_8_99_5","XORG-6_8_99_6","XORG-6_8_99_7","XORG-6_8_99_8","XORG-6_8_99_9","XORG-6_8_99_900","XORG-6_8_99_901","XORG-6_8_99_902","XORG-6_8_99_903","XORG-6_99_99_900","XORG-6_99_99_901","XORG-6_99_99_902","XORG-6_99_99_903","XORG-6_99_99_904","XORG-7_0","XORG-7_0_99_901","XORG-7_1","XORG-CURRENT-CLOSED","XORG-CURRENT-premerge-release-1","XORG-CYGWIN-LAST-MERGE","XORG-CYGWIN-MERGE","XORG-MAIN","XORG-RELEASE-1-BASE","XORG-RELEASE-1-MERGE","XORG-RELEASE-1-STSF-FORK","XORG-RELEASE-1-TM-BASE","XORG-RELEASE-1-TM-CLOSED","XORG-RELEASE-1-TM-MERGE","XORG-TM-CYGWIN-LAST-MERGE","XORG-TM-CYGWIN-MERGE","XPRINT_BASE","XPRINT_BEGIN","before_20040421_xprint_branch_landing","lg3d-base","lg3d-rel-0-6-2","lg3d-rel-0-7-0","libXi-1.0.2","libXi-1.0.3","libXi-1.0.4","libXi-1.1.0","libXi-1.1.1","libXi-1.1.2","libXi-1.1.3","libXi-1.1.4","libXi-1.2.0","libXi-1.2.1","libXi-1.2.99.1","libXi-1.2.99.2","libXi-1.2.99.3","libXi-1.2.99.4","libXi-1.3","libXi-1.3.1","libXi-1.3.2","libXi-1.4.0","libXi-1.4.1","libXi-1.4.2","libXi-1.4.3","libXi-1.4.4","libXi-1.4.5","libXi-1.4.99.1","libXi-1.5.0","libXi-1.5.99.2","libXi-1.5.99.3","libXi-1.6.0","libXi-1.6.1","libXi-1.6.2","libXi-1.6.2.901","libXi-1.6.99.1","libXi-1.7","libXi-1.7.1","libXi-1.7.1.901","libXi-1.7.2","libXi-1.7.3","libXi-1.7.4","libXi-1.7.5","libXi-1.7.6","libXi-1_0_1","rel-0-6-1","sco_port_update-base","xf86-012804-2330","xf86-4_3_0_1","xf86-4_3_99_16","xf86-4_3_99_901","xf86-4_3_99_902","xf86-4_3_99_903","xf86-4_3_99_903_special","xf86-4_4_0","xf86-4_4_99_1","xo-6_7_0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"24"}]},{"events":[{"introduced":"0"},{"last_affected":"25"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7946.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}