Red Hat Bugzilla – Bug 1381919
CVE-2016-7951 libXtst: Insufficient validation of server responses result in Integer overflows
Last modified: 2017-03-09 19:46:28 EST
It was found that when receiving a response from the server protocol data is not validated sufficiently. This results in integer overflows. Upstream patch: https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3 External References: https://lists.x.org/archives/xorg-announce/2016-October/002720.html CVE assignment: http://seclists.org/oss-sec/2016/q4/17
Created libXtst tracking bugs for this issue: Affects: fedora-all [bug 1381923]