Date: Fri, 3 Nov 1995 11:59:31 +0100 (MET) From: Christoph Kukulies <kuku@gilberto.physik.rwth-aachen.de> To: freebsd-security@freebsd.org Subject: X Server Vulnerability and New Binaries (fwd) Message-ID: <199511031059.LAA20715@gilberto.physik.rwth-aachen.de>
next in thread | raw e-mail | index | archive | help
Just FYI - Is FreeBSD affected by this, too? --Chris Christoph P. U. Kukulies kuku@gil.physik.rwth-aachen.de | |Forwarded message: |From owner-port-i386@netbsd.org Fri Nov 3 11:52:49 1995 |Date: Fri, 3 Nov 1995 09:21:18 +0100 |From: matthieu@laas.fr (Matthieu Herrb) |Message-Id: <9511030821.AA27313@elwood.laas.fr> |To: Curt Sampson <curt@portal.ca> |Cc: port-i386@netbsd.org |Subject: X Server Vulnerability and New Binaries |In-Reply-To: <Pine.NEB.3.91.951102173111.15236g-100000@cynic.portal.ca> |References: <Pine.NEB.3.91.951102173111.15236g-100000@cynic.portal.ca> |Reply-To: matthieu@laas.fr |Sender: owner-port-i386@netbsd.org |Precedence: list |X-Loop: port-i386@NetBSD.ORG | |You wrote (in your message from Thu 2) | > | > Is anyone building a new binary for X11R6 on NetBSD 1.0/i386 that | > incorporates patch13, the fix for the X security vulnerability just | > announced by CERT? I really don't have the time and energy to do | > this just now. | |I've done it. It should be on |ftp.xfree86.org:/pub/XFree86/current/binaries/NetBSD/ and all its |mirrors. The file is named X312Sxdm.tgz. | |BTW, MD5 (X312Sxdm.tgz) = 0bc74cbee0214366ac15658bf5436853 | | | Matthieu |
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199511031059.LAA20715>