It was found that when receiving a response from the server protocol data is not validated sufficiently. This results in various data mishandlings. Upstream patch: https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3 External References: https://lists.x.org/archives/xorg-announce/2016-October/002720.html CVE assignment: http://seclists.org/oss-sec/2016/q4/17
Created libXtst tracking bugs for this issue: Affects: fedora-all [bug 1381923]