Date: Tue, 2 May 2006 19:52:10 -0400 From: Jung-uk Kim <jkim@FreeBSD.org> To: freebsd-x11@FreeBSD.org Cc: lesi@FreeBSD.org Subject: Re: [PATCH] CVE-2006-1525 Message-ID: <200605021952.14284.jkim@FreeBSD.org> In-Reply-To: <200605021916.18364.jkim@FreeBSD.org> References: <200605021916.18364.jkim@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 02 May 2006 07:16 pm, Jung-uk Kim wrote: > There's a new Xorg security patch: > > http://xorg.freedesktop.org/releases/X11R6.9.0/patches/ > > x11r6.9.0-mitri.diff: > CVE-2006-1525: A buffer overflow in the Render extension triangle > handling code makes it possible for an authorized client to crash > the X server or allow execution of malicious code with the > privileges of the X server. > > MD5: d666925bfe3d76156c399091578579ae x11r6.9.0-mitri.diff > SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c x11r6.9.0-mitri.diff Patch for ports is here: http://people.freebsd.org/~jkim/xorg-CVE-2006-1525.diff FYI... Jung-uk Kim
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605021952.14284.jkim>