pkgsrc/x11/libXext/distinfo
wiz 36f51e6ca4 Update to 1.3.2:
This release provides fixes for the recently announced security issue
CVE-2013-1982, as well as build configuration improvements, man page
macro cleanups to work better with doclifter, and several other small
fixes.

Adam Jackson (1):
      configure: Remove AM_MAINTAINER_MODE

Alan Coopersmith (8):
      Use _XEatDataWords to avoid overflow of rep.length bit shifting
      integer overflow in XcupGetReservedColormapEntries() [CVE-2013-1982 1/6]
      integer overflow in XcupStoreColors() [CVE-2013-1982 2/6]
      several integer overflows in XdbeGetVisualInfo() [CVE-2013-1982 3/6]
      integer overflow in XeviGetVisualInfo() [CVE-2013-1982 4/6]
      integer overflow in XShapeGetRectangles() [CVE-2013-1982 5/6]
      integer overflow in XSyncListSystemCounters() [CVE-2013-1982 6/6]
      libXext 1.3.2

Chase Douglas (1):
      Destroy generic event extension after last display is removed

Colin Walters (1):
      autogen.sh: Implement GNOME Build API

Eric S. Raymond (2):
      Replace various unsafe presentation-level requests with .RS/.RE and .EX/EE.
      Replace presentationm-level requests with .RS/RE.

Peter Hutterer (1):
      sync: fix copy/paste error in comment

Thomas Klausner (1):
      Avoid having macros expand code to be: ((f) ? (f)->m1 : NULL)->m2
2013-06-01 06:50:27 +00:00

6 lines
305 B
Text

$NetBSD: distinfo,v 1.10 2013/06/01 06:50:27 wiz Exp $
SHA1 (libXext-1.3.2.tar.bz2) = 49b6f026b0555d020014dbc24b49afc2986a30e0
RMD160 (libXext-1.3.2.tar.bz2) = 590c22c5fd97719f2604dd231f007d86d203c8ac
Size (libXext-1.3.2.tar.bz2) = 378901 bytes
SHA1 (patch-aa) = 5ce454740b3293cc7898e67b630a2530709a02b8