Matthias,

Thanks for the fix.

Does Solaris 10 have that fault?

What about RHEL6?

Pat
---

On Tue, Apr 5, 2011 at 11:46 AM, Matthias Hopf <[email protected]> wrote:
> xrdb security issue; separate announcement follows.
> This fixes CVE-2011-0465.
>
>
> Matthias Hopf (2):
>      Create shell-escape-safe cpp options in the non-pathetic-cpp case.
>      Bump to 1.0.9
>
> git tag: xrdb-1.0.9
>
> http://xorg.freedesktop.org/archive/individual/app/xrdb-1.0.9.tar.bz2
> MD5:  ed2e48cf33584455d74615ad4bbe4246  xrdb-1.0.9.tar.bz2
> SHA1: efa5f2420411988d6a6e142934393fd272507857  xrdb-1.0.9.tar.bz2
>
> http://xorg.freedesktop.org/archive/individual/app/xrdb-1.0.9.tar.gz
> MD5:  cc66bd89cd830c8b4c839421397457ac  xrdb-1.0.9.tar.gz
> SHA1: 0beefc6dc4fa99bd673b58ed5b2b13d741621720  xrdb-1.0.9.tar.gz
>
>
> _______________________________________________
> [email protected]: X.Org support
> Archives: http://lists.freedesktop.org/archives/xorg
> Info: http://lists.freedesktop.org/mailman/listinfo/xorg
> Your subscription address: [email protected]
>
_______________________________________________
[email protected]: X.Org support
Archives: http://lists.freedesktop.org/archives/xorg
Info: http://lists.freedesktop.org/mailman/listinfo/xorg
Your subscription address: [email protected]

Reply via email to