[CVE-2006-1525] X.Org security advisory: Buffer overflow in the Xrender extension

Adam Jackson ajax at nwnk.net
Tue May 2 08:34:42 PDT 2006


On Tuesday 02 May 2006 10:41, Jeremy C. Reed wrote:
> > Cc: xorg-annonce at lists.freedesktop.org
>
> Typo above?
>
> > Fix:
> >
> > Apply the patch below to the source tree for the modular xorg-server
> > source package:
> >
> > 9a9356f86fe2c10985f1008d459fb272           xorg-server-1.0.x-mitri.diff
> > d6eba2bddac69f12f21785ea94397b206727ba93   xorg-server-1.0.x-mitri.diff
> > http://xorg.freedesktop.org/releases/X11R7.0/patches/
>
> Should this point to a new release tarball for individual xorg-server also
> instead of just a patch?

No, in the sense that that tarball doesn't exist yet.  But yes, I can spin 
another 1.0.x release if we want, I don't think anything's changed since the 
last one.

- ajax
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.x.org/archives/xorg/attachments/20060502/985a5f05/attachment.pgp>


More information about the xorg mailing list