version 1.18, 2008/04/03 06:00:14 |
version 1.19, 2008/07/15 17:29:25 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="012_xorg2"></a> |
|
<font color="#009000"><strong>012: SECURITY FIX: July 15, 2008</strong></font> <i>All architectures</i><br> |
|
Multiple vulnerabilities have been discovered in X.Org.<br> |
|
RENDER Extension heap buffer overflow, |
|
RENDER Extension crash, |
|
RENDER Extension memory corruption, |
|
MIT-SHM arbitrary memory read, |
|
RECORD and Security extensions memory corruption. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2008-2360</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2008-2361</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2008-2362</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2008-1379</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2008-1377</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/012_xorg2.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="011_openssh2"></a> |
<li><a name="011_openssh2"></a> |
<font color="#009000"><strong>011: SECURITY FIX: April 3, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>011: SECURITY FIX: April 3, 2008</strong></font> <i>All architectures</i><br> |
Avoid possible hijacking of X11-forwarded connections with sshd(8) |
Avoid possible hijacking of X11-forwarded connections with sshd(8) |