=b67581cf825940fdf52bf2e0af4330e695d724a4
A fix of this vulnerability will be included in xserver 1.11.2 and
xserver 1.12.
The X.Org Foundation thanks vladz (http://vladz.devzero.fr) for
bringing this issue to our attention and helping testing the fixes.
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE
ve been forced to cancel it, please
update your information.
Looking forward to see you in Toulouse.
--
Matthieu Herrb
On behalf of X.Org Foundation Board
--
Matthieu Herrb
pgpJTJfx1wJhL.pgp
Description: PGP signature
___
xorg-announce maili
ttp://www.x.org/wiki/Events/XDS2010/Attendees> is required though.
You will find practical informations on the main wiki page for the
event to organize your travel.
Looking forward to see you in Toulouse.
--
Matthieu Herrb
On behalf of X.Org Foundation Board
___
22611
xf86-video-wsfb: Remove unused .cvsignore file #23776
Jasper Lievisse Adriaanse (1):
add some missing TRACE_EXITs, tweak and clean up comments.
Matthieu Herrb (7):
Makefile.am: nuke RCS Id
Remove old libc wrapper stuff. now works with xserver 1.5.
wsfb: update
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
X.Org security advisory, June 11th, 2008
Multiple vulnerabilities in X server extensions
CVE IDs: CVE-2008-1377, CVE-2008-1379, CVE-2008-2360, CVE-2008-2361,
~ CVE-2008-2362
Overview
Several vulnerabilities have been found in the server-sid
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matthieu Herrb wrote:
| X.Org security advisory, January 17th, 2008
| Multiple vulnerabilities in the X server
| CVE IDs: CVE-2007-5760, CVE-2007-5958, CVE-2007-6427, CVE-2007-6428,
| CVE-2007-6429, CVE-2008-0006
|
| Overview
|
| Several
ted to iDefense Labs by
regenrecht.
CVE-2008-0006 was reported by to CERT/CC by Takuya Shiozaki,
[EMAIL PROTECTED] member of CodeBlog (http://www.codeblog.org/)
The reporter of CVE-2007-5859 wishes to remain anonymous.
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4
y.diff
MD5: e61a30a8cff105b86f8b924d84508e24 xorg-xfs-1.0.4-query.diff
SHA1: 093db0ce2c134ebc40e47a40db89503dad2b0f3e xorg-xfs-1.0.4-query.diff
Thanks
These vulnerabilities were discovered by Sean Larsson from iDefense
Labs.
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ademar de Souza Reis Jr (1):
Document catalogue: feature
Matthieu Herrb (3):
fix for integer overflows in build_range(). CVE-4568.
Fix for heap overwrite in swap_char2b() CVE-2007-4568.
Bump to 1.0.5
git tag: xfs-1.0.5
http
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matthieu Herrb (4):
remove .serverauth.$$ file on signals or errors
MKCOOKIE program for OpenBSD.
generate
Bump to 1.0.6
git tag: xinit-1.0.6
http://xorg.freedesktop.org/archive/individual/app/xinit-1.0.6.tar.bz2
MD5
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
James Cloos (2):
Rename .cvsignore to .gitignore
Add *~ to .gitignore to skip patch/emacs droppings
Matthieu Herrb (1):
update to 1.0.3
git tag: beforelight-1.0.3
http://xorg.freedesktop.org/archive/individual/app/beforelight
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alan Coopersmith (2):
Sun Bug 6504978: xman on Solaris x86 does not render correctly,
nroff visible
renamed: .cvsignore -> .gitignore
Matthieu Herrb (1):
Bump version for release
git tag: xman-1.0.3
http://xorg.freedesktop.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alan Coopersmith (2):
Sun Bug 6504978: xman on Solaris x86 does not render correctly,
nroff visible
renamed: .cvsignore -> .gitignore
Matthieu Herrb (1):
Bump version for release
git tag: xman-1.0.3
http://xorg.freedesktop.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Matthieu Herrb (6):
Modernize build
Add emacs droppings to the list of ignored files.
Untabify message before inserting it.
Add rules to generate ChangeLog.
fill in this generated file.
Bump version
git tag
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Marc Balmer (1):
Typo, it's xsetroot, not setroot.
Matthieu Herrb (5):
- renamed .cvsignore -> .gitignore
- Replace static ChangeLog with disthook to generate from git log
Change xsetroot_CFLAGS to AM_CFLAGS to avoid
advices in fixing it.
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iQCVAwUBRhLOpnKGCS6JWssnAQKphwQAi+8ofGsHiPpYuI01iIxHuilvJobOi+UT
yPShf25RJa4JImUOyZ2KMELU0cpoy1qYphStsLgnxXt5rf9UpG1HRoHaLTNRP6d4
Sean Larsson of iDefense Labs discovered the vulnerabilities and
provided sample code and advices in fixing them.
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iQCVAwUBRaOjYHKGCS6JWssnAQ
(xf86-video-wsfb-0.2.1.tar.bz2) =
5f7fff95bf0f9409dc392e2f5c192156bf168b33
MD5 (xf86-video-wsfb-0.2.1.tar.gz) = 0766cf0c4de8082401fd326d795b7bb8
SHA1 (xf86-video-wsfb-0.2.1.tar.gz) =
065b3feec677bd05a1320ecd1bb16c779a9a87fb
- --
Matthieu Herrb
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5
18 matches
Mail list logo