From owner-freebsd-x11@FreeBSD.ORG Tue May 2 23:16:43 2006 Return-Path: X-Original-To: freebsd-x11@FreeBSD.org Delivered-To: freebsd-x11@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5350316A40F; Tue, 2 May 2006 23:16:43 +0000 (UTC) (envelope-from jkim@FreeBSD.org) Received: from anuket.mj.niksun.com (gwnew.niksun.com [65.115.46.162]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3C22643D48; Tue, 2 May 2006 23:16:39 +0000 (GMT) (envelope-from jkim@FreeBSD.org) Received: from niksun.com (anuket [10.70.0.5]) by anuket.mj.niksun.com (8.13.1/8.13.1) with ESMTP id k42NGba8067546; Tue, 2 May 2006 19:16:37 -0400 (EDT) (envelope-from jkim@FreeBSD.org) From: Jung-uk Kim To: lesi@FreeBSD.org Date: Tue, 2 May 2006 19:16:12 -0400 User-Agent: KMail/1.6.2 MIME-Version: 1.0 Content-Disposition: inline Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <200605021916.18364.jkim@FreeBSD.org> X-Virus-Scanned: ClamAV 0.88/1436/Tue May 2 13:41:37 2006 on anuket.mj.niksun.com X-Virus-Status: Clean Cc: freebsd-x11@FreeBSD.org Subject: [PATCH] CVE-2006-1525 X-BeenThere: freebsd-x11@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: X11 on FreeBSD -- maintaining and support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 May 2006 23:16:45 -0000 There's a new Xorg security patch: http://xorg.freedesktop.org/releases/X11R6.9.0/patches/ x11r6.9.0-mitri.diff: CVE-2006-1525: A buffer overflow in the Render extension triangle handling code makes it possible for an authorized client to crash the X server or allow execution of malicious code with the privileges of the X server. MD5: d666925bfe3d76156c399091578579ae x11r6.9.0-mitri.diff SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c x11r6.9.0-mitri.diff FYI... Jung-uk Kim