38a8582ee8
This bug fix release delivers the fixes for the recently announced security vulnerability CVE-2013-2062, alongside the last couple years accumulation of janitorial cleanups, compiler warning fixes, and adjustments to remain compatible with changes in new and future automake releases. Alan Coopersmith (10): Strip trailing whitespace Stop trying to use NULL for Status values Fix XpEventToWire arguments to match what libXext expects Add const qualifiers to silence gcc -Wwrite-strings warnings Replace deprecated Automake INCLUDES variable with AM_CPPFLAGS Use _XEatDataWords to avoid overflow of rep.length bit shifting integer overflow in XpGetAttributes & XpGetOneAttribute [CVE-2013-2062 1/3] integer overflows in XpGetPrinterList() [CVE-2013-2062 2/3] integer overflows in XpQueryScreens() [CVE-2013-2062 3/3] libXp 1.0.2
5 lines
239 B
Text
5 lines
239 B
Text
$NetBSD: distinfo,v 1.3 2013/05/31 08:24:51 wiz Exp $
|
|
|
|
SHA1 (libXp-1.0.2.tar.bz2) = bac586283c089536e526529de21b13778a428c07
|
|
RMD160 (libXp-1.0.2.tar.bz2) = 616dce4bd663c9325e70b64d7bed39ce411ad1bf
|
|
Size (libXp-1.0.2.tar.bz2) = 298632 bytes
|