[CVE-2006-1525] X.Org security advisory: Buffer overflow in the Xrender extension
Adam Jackson
ajax at nwnk.net
Tue May 2 08:34:42 PDT 2006
On Tuesday 02 May 2006 10:41, Jeremy C. Reed wrote:
> > Cc: xorg-annonce at lists.freedesktop.org
>
> Typo above?
>
> > Fix:
> >
> > Apply the patch below to the source tree for the modular xorg-server
> > source package:
> >
> > 9a9356f86fe2c10985f1008d459fb272 xorg-server-1.0.x-mitri.diff
> > d6eba2bddac69f12f21785ea94397b206727ba93 xorg-server-1.0.x-mitri.diff
> > http://xorg.freedesktop.org/releases/X11R7.0/patches/
>
> Should this point to a new release tarball for individual xorg-server also
> instead of just a patch?
No, in the sense that that tarball doesn't exist yet. But yes, I can spin
another 1.0.x release if we want, I don't think anything's changed since the
last one.
- ajax
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.x.org/archives/xorg/attachments/20060502/985a5f05/attachment.pgp>
More information about the xorg
mailing list