On Mon, Sep 20, 2004 at 02:02:11PM +0200, Moritz M??hlenhoff wrote: > There are three exploitable stack and integer overflows in the > XPM handling code shipped with XFree: Full details can be found > in this advisory from Chris Evans which I copied at the end of > this mail for archival purposes. Branden Robinson has the patch and is handling the DSA for woody; I understnad he is also handling the 4.3 upload for sid. Branden? -- Daniel Stone <daniels@debian.org> Debian: the universal operating system http://www.debian.org
Attachment:
signature.asc
Description: Digital signature