xserver/hw
Alan Coopersmith db386cd6a1 dri2: integer overflow in ProcDRI2GetBuffers() [CVE-2014-8094]
ProcDRI2GetBuffers() tries to validate a length field (count).
There is an integer overflow in the validation. This can cause
out of bound reads and memory corruption later on.

Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Reviewed-by: Peter Hutterer <peter.hutterer@who-t.net>
Reviewed-by: Julien Cristau <jcristau@debian.org>
(cherry picked from commit 6692670fde)
Signed-off-by: Julien Cristau <jcristau@debian.org>
2014-12-09 17:50:12 +01:00
..
dmx glxproxy: Fix memory leak on error path in CreateGLXPixmap (#50281) (v2) 2014-05-22 17:13:59 -07:00
kdrive kdrive: Ignore failure to chown console tty to current user 2014-04-18 16:30:17 -07:00
vfb Build fbcmap_mi.c once, rather than once for each DDX 2014-03-27 14:34:06 +00:00
xfree86 dri2: integer overflow in ProcDRI2GetBuffers() [CVE-2014-8094] 2014-12-09 17:50:12 +01:00
xnest Build fbcmap_mi.c once, rather than once for each DDX 2014-03-27 14:34:06 +00:00
xquartz XQuartz: Better support turning off "Displays have separate Spaces" on OS X Mavericks 2014-08-11 13:20:44 -07:00
xwayland xwayland: always include drm.xml in tarballs 2014-09-21 10:55:39 +02:00
xwin hw/xwin: link dynamically and export symbols 2014-07-03 15:48:07 +01:00
Makefile.am Xwayland DDX 2014-04-03 15:19:22 -07:00