Date: Wed, 19 Nov 2008 13:24:15 -0600 From: "Jeremy Messenger" <mezz7@cox.net> To: pluknet <pluknet@gmail.com> Cc: gnome@freebsd.org Subject: Re: Libxml2 Two Integer Overflow Vulnerabilities Message-ID: <op.ukvr7cmh9aq2h7@localhost> In-Reply-To: <a31046fc0811181445r6ee49512q337c9664b5fe4ad6@mail.gmail.com> References: <a31046fc0811181445r6ee49512q337c9664b5fe4ad6@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 18 Nov 2008 16:45:17 -0600, pluknet <pluknet@gmail.com> wrote: > http://secunia.com/Advisories/32773/ > CVE-2008-4225 > CVE-2008-4226 > > Patch: > https://bugzilla.redhat.com/attachment.cgi?id=322844 > https://bugzilla.redhat.com/attachment.cgi?id=322846 > > Both patches look applicable to our 2.6.32 version in ports. Committed, thanks! Cheers, Mezz -- mezz7@cox.net - mezz@FreeBSD.org FreeBSD GNOME Team http://www.FreeBSD.org/gnome/ - gnome@FreeBSD.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.ukvr7cmh9aq2h7>