PatchSiren cyber security CVE debrief
CVE-2016-10164 X.org CVE debrief
CVE-2016-10164 is a critical libXpm flaw affecting versions before 3.5.12. When a program parses XPM extensions on a 64-bit platform, crafted input can trigger integer overflows in the number of extensions or their combined length, leading to a heap-based buffer overflow. The stated impact includes denial of service and potential arbitrary code execution.
- Vendor
- X.org
- Product
- CVE-2016-10164
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-01
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-01
- Advisory updated
- 2026-05-13
Who should care
Security teams, distro maintainers, and application owners that ship or embed libXpm, especially software that accepts or parses untrusted XPM files and enables extension parsing on 64-bit systems.
Technical summary
According to the NVD record, libXpm before 3.5.12 contains multiple integer overflow conditions in XPM extension parsing. A crafted XPM file can cause the parser to miscalculate either the extension count or the concatenated extension length. Those bad size calculations can result in an undersized heap allocation followed by an out-of-bounds write, which NVD maps to CWE-119, CWE-190, and CWE-787. The affected CPE range is libXpm versions up to and including 3.5.11.
Defensive priority
Immediate
Recommended defensive actions
- Upgrade libXpm to 3.5.12 or later.
- Prioritize patching any system that accepts untrusted XPM files or processes image content from external sources.
- Review downstream vendor advisories and apply available package updates from your distribution.
- If immediate upgrading is not possible, reduce exposure by limiting where XPM parsing occurs and treating external XPM input as untrusted.
- Verify dependency inventories for applications linked against libXpm, including bundled copies in vendor products.
Evidence notes
The official NVD record lists the vulnerability as modified on 2026-05-13 and published on 2017-02-01, with CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and severity 9.8. The corpus also includes the upstream patch reference, xorg mailing list discussion, and downstream advisories from Debian, Red Hat, and Gentoo, all consistent with a fixed version boundary at 3.5.12. This debrief uses only the supplied corpus and official links.
Official resources
-
CVE-2016-10164 CVE record
CVE.org
-
CVE-2016-10164 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
Publicly disclosed in the NVD/CVE record on 2017-02-01. Later database updates, including the 2026-05-13 modification timestamp, are record maintenance events and not the vulnerability's original issue date.