Subject: [Security Fix] X.Org Buffer overflow
To: None <current-users@NetBSD.org>
From: Adrian Portelli <adrianp@NetBSD.org>
List: current-users
Date: 05/09/2006 19:34:58
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

On the 15th March 2006 X.Org 7.0 modular was imported into xsrc/. On the
2nd May 2006 the NetBSD Security Officer team became aware of a
security issue in the version imported into xsrc.

The original advisory for this issue can be found at:

 http://lists.freedesktop.org/archives/xorg/2006-May/015136.html

The relevant CVE entry is CVE-2006-1526.

This vulnerability does not exist in the NetBSD 1.x, 2.x, or 3.x code
bases. However, NetBSD-current was found to be vulnerable to this issue.

This issue was fixed in the NetBSD CVS tree on the 3rd of May 2006.
Users currently running NetBSD-current are advised to update the
following file:

	xsrc/xorg/xserver/xorg/render/mitri.c

This will resolve the known security issue.	

To update from CVS:
		
	# cd xsrc
	# cvs update -d -P xorg/xserver/xorg/render/mitri.c

Thanks To
=========

Matthias Drochner for the fixes in NetBSD-current.

On behalf of security-officer@,

adrian.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (NetBSD)

iD8DBQFEYN6aLc2rR0mnFJ8RAuylAJ94V6WfqIJKIK2B5vsYEFOpiRo6qwCfVHbi
+aq/z8BqvuiONe5vwW4FEuo=
=3Lzd
-----END PGP SIGNATURE-----