Date: Tue, 2 May 2006 19:16:12 -0400 From: Jung-uk Kim <jkim@FreeBSD.org> To: lesi@FreeBSD.org Cc: freebsd-x11@FreeBSD.org Subject: [PATCH] CVE-2006-1525 Message-ID: <200605021916.18364.jkim@FreeBSD.org>
next in thread | raw e-mail | index | archive | help
There's a new Xorg security patch: http://xorg.freedesktop.org/releases/X11R6.9.0/patches/ x11r6.9.0-mitri.diff: CVE-2006-1525: A buffer overflow in the Render extension triangle handling code makes it possible for an authorized client to crash the X server or allow execution of malicious code with the privileges of the X server. MD5: d666925bfe3d76156c399091578579ae x11r6.9.0-mitri.diff SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c x11r6.9.0-mitri.diff FYI... Jung-uk Kim
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605021916.18364.jkim>