On Mon, Sep 20, 2004 at 06:48:28AM -0700, Daniel Stone wrote: > On Mon, Sep 20, 2004 at 02:02:11PM +0200, Moritz M??hlenhoff wrote: > > There are three exploitable stack and integer overflows in the > > XPM handling code shipped with XFree: Full details can be found > > in this advisory from Chris Evans which I copied at the end of > > this mail for archival purposes. > > Branden Robinson has the patch and is handling the DSA for woody; I > understnad he is also handling the 4.3 upload for sid. Branden? For the sake of posterity (read: the mailing list archives), Fabio and I agreed that he would handle sid in this situation. -- G. Branden Robinson | The software said it required Debian GNU/Linux | Windows 3.1 or better, so I branden@debian.org | installed Linux. http://people.debian.org/~branden/ |
Attachment:
signature.asc
Description: Digital signature