On Mon, Sep 20, 2004 at 02:02:11PM +0200, Moritz M??hlenhoff wrote:
> There are three exploitable stack and integer overflows in the
> XPM handling code shipped with XFree: Full details can be found
> in this advisory from Chris Evans which I copied at the end of
> this mail for archival purposes.

Branden Robinson has the patch and is handling the DSA for woody; I
understnad he is also handling the 4.3 upload for sid.  Branden?

-- 
Daniel Stone                                                <[EMAIL PROTECTED]>
Debian: the universal operating system                     http://www.debian.org

Attachment: signature.asc
Description: Digital signature

Reply via email to