version 1.9, 2008/01/11 16:59:14 |
version 1.10, 2008/02/08 06:35:03 |
|
|
|
|
<ul> |
<ul> |
|
|
|
<li><a name="006_xorg"></a> |
|
<font color="#009000"><strong>006: SECURITY FIX: February 8, 2008</strong></font> <i>All architectures</i><br> |
|
Multiple vulnerabilities have been discovered in X.Org.<br> |
|
XFree86 Misc extension out of bounds array index, |
|
File existence disclosure, |
|
Xinput extension memory corruption, |
|
TOG-cup extension memory corruption, |
|
MIT-SHM and EVI extensions integer overflows, |
|
PCF Font parser buffer overflow. |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760">CVE-2007-5760</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958">CVE-2007-5958</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427">CVE-2007-6427</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428">CVE-2007-6428</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429">CVE-2007-6429</a>, |
|
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006">CVE-2008-0006</a>. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.2/common/006_xorg.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="005_ifrtlabel"></a> |
<li><a name="005_ifrtlabel"></a> |
<font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>005: RELIABILITY FIX: January 11, 2008</strong></font> <i>All architectures</i><br> |
A missing NULL pointer check can lead to a kernel panic.<br> |
A missing NULL pointer check can lead to a kernel panic.<br> |