Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 2 May 2006 19:52:10 -0400
From:      Jung-uk Kim <jkim@FreeBSD.org>
To:        freebsd-x11@FreeBSD.org
Cc:        lesi@FreeBSD.org
Subject:   Re: [PATCH] CVE-2006-1525
Message-ID:  <200605021952.14284.jkim@FreeBSD.org>
In-Reply-To: <200605021916.18364.jkim@FreeBSD.org>
References:  <200605021916.18364.jkim@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tuesday 02 May 2006 07:16 pm, Jung-uk Kim wrote:
> There's a new Xorg security patch:
>
> http://xorg.freedesktop.org/releases/X11R6.9.0/patches/
>
> x11r6.9.0-mitri.diff:
> CVE-2006-1525: A buffer overflow in the Render extension triangle
> handling code makes it possible for an authorized client to crash
> the X server or allow execution of malicious code with the
> privileges of the X server.
>
> MD5: d666925bfe3d76156c399091578579ae x11r6.9.0-mitri.diff
> SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c x11r6.9.0-mitri.diff

Patch for ports is here:

http://people.freebsd.org/~jkim/xorg-CVE-2006-1525.diff

FYI...

Jung-uk Kim



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200605021952.14284.jkim>