Security fix for CVE-2016-7951, CVE-2016-7952 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1381919 - CVE-2016-7951 libXtst: Insufficient validation of server responses result in Integer overflows https://bugzilla.redhat.com/show_bug.cgi?id=1381919 [ 2 ] Bug #1381922 - CVE-2016-7952 libXtst: Insufficient validation of server responses result in various data mishandlings https://bugzilla.redhat.com/show_bug.cgi?id=1381922 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update libXtst' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/.