Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 May 2006 19:16:12 -0400
From:      Jung-uk Kim <jkim@FreeBSD.org>
To:        lesi@FreeBSD.org
Cc:        freebsd-x11@FreeBSD.org
Subject:   [PATCH] CVE-2006-1525
Message-ID:  <200605021916.18364.jkim@FreeBSD.org>

next in thread | raw e-mail | index | archive | help
There's a new Xorg security patch:

http://xorg.freedesktop.org/releases/X11R6.9.0/patches/

x11r6.9.0-mitri.diff:
CVE-2006-1525: A buffer overflow in the Render extension triangle 
handling code makes it possible for an authorized client to crash the 
X server or allow execution of malicious code with the privileges of 
the X server.

MD5: d666925bfe3d76156c399091578579ae x11r6.9.0-mitri.diff
SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c x11r6.9.0-mitri.diff

FYI...

Jung-uk Kim



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605021916.18364.jkim>