Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 14 Apr 2015 09:10:04 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
CC: Yann Droneaud <ydroneaud@...eya.com>, Florian Weimer <fweimer@...hat.com>,
        Marc Deslauriers <marc.deslauriers@...onical.com>,
        cve-assign@...re.org
Subject: Re: Re: CVE Request: libX11: buffer overflow in MakeBigReq
 macro

X.Org issued the attached advisory today, just in case any distro builders
hadn't rebuilt yet and hadn't noticed the discussion here.

As usual, it's also posted to our advisories page at:
	http://www.x.org/wiki/Development/Security/

-- 
	-Alan Coopersmith-              alan.coopersmith@...cle.com
	  X.Org Security Response Team - xorg-security@...ts.x.org


[ CONTENT OF TYPE message/rfc822 SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ