Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <552D3BDC.10808@oracle.com>
Date: Tue, 14 Apr 2015 09:10:04 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
CC: Yann Droneaud <ydroneaud@...eya.com>, Florian Weimer <fweimer@...hat.com>,
        Marc Deslauriers <marc.deslauriers@...onical.com>,
        cve-assign@...re.org
Subject: Re: Re: CVE Request: libX11: buffer overflow in MakeBigReq
 macro

X.Org issued the attached advisory today, just in case any distro builders
hadn't rebuilt yet and hadn't noticed the discussion here.

As usual, it's also posted to our advisories page at:
	http://www.x.org/wiki/Development/Security/

-- 
	-Alan Coopersmith-              alan.coopersmith@...cle.com
	  X.Org Security Response Team - xorg-security@...ts.x.org


Download attachment "Attached Message" of type "message/rfc822" (8123 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.